qid
int64
1
74.7M
question
stringlengths
12
33.8k
date
stringlengths
10
10
metadata
list
response_j
stringlengths
0
115k
response_k
stringlengths
2
98.3k
54,664,774
I try crawling seed urls that are http/https but for few https urls i get below error FetcherThread INFO api.HttpRobotRulesParser (168) - Couldn't get robots.txt for <https://corporate.douglas.de/investors/?lang=en>: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target on other hand <https://www.integrafin.co.uk/annual-reports/> is crawled perfectly fine below is my configuration plugin.includes protocol-http|urlfilter-regex|parse-(html|tika|text)|index-(basic|anchor|more|static|links)|indexer-solr|scoring-opic|urlnormalizer-(pass|regex|basic)|urlmeta|language-identifier
2019/02/13
[ "https://Stackoverflow.com/questions/54664774", "https://Stackoverflow.com", "https://Stackoverflow.com/users/10326189/" ]
It used Pacific time to reset api key quota <https://time.is/PT>
Google Custom Search API has a free quota for 100 queries per day, so what timezone is used by the API for counting the daily quota? answer is GMT
54,664,774
I try crawling seed urls that are http/https but for few https urls i get below error FetcherThread INFO api.HttpRobotRulesParser (168) - Couldn't get robots.txt for <https://corporate.douglas.de/investors/?lang=en>: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target on other hand <https://www.integrafin.co.uk/annual-reports/> is crawled perfectly fine below is my configuration plugin.includes protocol-http|urlfilter-regex|parse-(html|tika|text)|index-(basic|anchor|more|static|links)|indexer-solr|scoring-opic|urlnormalizer-(pass|regex|basic)|urlmeta|language-identifier
2019/02/13
[ "https://Stackoverflow.com/questions/54664774", "https://Stackoverflow.com", "https://Stackoverflow.com/users/10326189/" ]
You can go to your quota page, <https://console.cloud.google.com/apis/api/customsearch.googleapis.com/quotas> and it says "Daily quotas reset at midnight Pacific Time (PT)." Even if you are in Europe or use a language that is not US English, Google's daily quota still uses Pacific Time. However, I wonder if it is really reset at 00:00 PT. I think it's been 24 hours since I used up the daily quota of a project, the usage now is still 100%. Weird.
Google Custom Search API has a free quota for 100 queries per day, so what timezone is used by the API for counting the daily quota? answer is GMT
122,709
I have an InDesign file with many character styles and paragraph styles defined in it, including use of the features "next paragraph style will be \_\_\_\_", numbering, indentation, hanging indents, grep styles, et. al. My InDesign subscription has expired and I would rather *not* renew it (but would be willing to do so for a month for a one-time transfer activity). I'm looking to recreate the character style/paragraph style and text editing workflow I had in InDesign, using free software. LibreOffice seems appropriate (though I'm open to other suggestions). 1. Is there a way to directly import or read character and paragraph styles from an .indd file (into LibreOffice, or some other free tool)? 2. If not, is there a way to export these from InDesign (if I renew my subscription) so they could be read in by LibreOffice or some other tool? A quick review of the options in LibreOffice paragraph styles suggests that *most* of what I've done in InDesign could be replicated in LibreOffice (with the possible exception of grep styles). However, I would rather avoid the painstaking work of creating each style again by hand.
2019/04/18
[ "https://graphicdesign.stackexchange.com/questions/122709", "https://graphicdesign.stackexchange.com", "https://graphicdesign.stackexchange.com/users/57377/" ]
The key is to know the layers panel. Here I have a text as my top layer and below it there's a group of colored shapes: [![enter image description here](https://i.stack.imgur.com/adIU4.jpg)](https://i.stack.imgur.com/adIU4.jpg) In the layers panel I right click the writing and select option Mask to Below. The text becomes a clipping mask for the group: [![enter image description here](https://i.stack.imgur.com/eORPH.jpg)](https://i.stack.imgur.com/eORPH.jpg) The group can be replaced by a single shape or a photo. The text can be replaced by any vector shape or pixel pattern. Mask to Below affects only one layer level downwards. Warnings: 1) The parts can still be selected via the layers panel individually.It's easy to trash a group or masked shape. 2) Affinity D allows in many cases as well pixel patterns as vector shapes. Many tasks are easiest with mixing both. One should be aware how high pixel resolution is needed in the final usage of the drawing. That cannot be increased later.
Looking to feature persona on your typography? This easy clipping masks educational indicates you the way to create patterned kind in only 4 smooth steps. **Step 1: Insert Text Elements** Start via way of means of importing a Shutterstock font as a vector file, or via way of means of typing out a word with the Type Tool from Adobe Illustrator’s font library. Clipping mask may be implemented to surely any vector form or kind inside Illustrator. **Font Library** Clipping mask also can be implemented to editable textual content from the Character Palette. With the Type Tool (T), kind out a phrase or word in a ambitious style, like Arial Black at 270 pts. Bold textual content permits the sample or heritage to reveal via whilst making sure legibility to your design. Avoid thinner font patterns while creating a clipping masks. Don’t fear approximately creating a compound path, as Illustrator registers the textual content as a grouped object. Add Character to Your Text with Patterned Clipping Masks – Type Tool **Step 2: Search for a Pattern or Background** With Shutterstock’s Plugin for Creative Cloud, you may navigate and seek via massive choices of styles and backgrounds immediately from the Adobe Illustrator program. The Plugin even has featured collections of styles, backgrounds, textures, and greater to scroll via. Add Character to Your Text with Patterned Clipping Masks – Adobe Illustrator Plugin I certified this woodland seamless sample to apply in my design. Seamless designs permit for limitless tiling with out wonderful borders or separations. I endorse a darker sample while the usage of a mild heritage, or vice versa, to assure legibility. **Step 3: Tile and Duplicate Pattern** Duplicate your picture via way of means of clicking the picture with the Selection Tool (V) and retaining down the Option and Shift keys whilst click on-dragging the picture. Holding down the Shift key simplifies the tiling system via way of means of aligning the styles flawlessly for a easy appearance. Add Character to Your Text with Patterned Clipping Masks – Duplicate and Tile Pattern Select the snap shots and institution them collectively with Command G or Object > Group. Arrange the styles in the back of the textual content via way of means of hitting Shift+Command+[ or with Object > Arrange > Send to Back. **Step 4: Make Clipping Mask** With the Selection Tool (V), click on each the heritage and the textual content and hit Command+7 or navigate to Object > Clipping Mask > Make. Edit the sample or flow the heritage round with Object > Clipping Mask > Edit Contents. To cast off the clipping masks, without a doubt hit Option+Command+7 and delete the heritage layer. Add Character to Your Text with Patterned Clipping Masks – Make Clipping Mask Your completed masks have to appearance some thing like this. You can use this on hand device to feature emphasis or persona on your titles and designs in only some steps.
10,337
I've been GMing/DMing on and off for years. I prefer playing. Mainly because when I run a game, I'm more a fly by the seat of your pants kind of dm, and it works sort of.. My problem is that, while I can come up with a grand sweeping overarching campaign plot pretty easily.... I have great difficulty coming up with stuff to do in the individual sessions at all, let alone ones that work along with overarching plot without either leaving it behind or rushing it forward. So I guess my question is this, how do you come up with stuff for the players to do in individual session. Being able to roll with the punches and keep things moving Im pretty good at, but I could really use some advice on what are good ways to come up with the "individual chapters" of the story.
2011/10/06
[ "https://rpg.stackexchange.com/questions/10337", "https://rpg.stackexchange.com", "https://rpg.stackexchange.com/users/2426/" ]
One word: **conflicts**. Conflicts drive action and plot. It sounds like you already have a grand scheme, but you want to drive the day-to-day adventuring within it. To get there, I'll build an example as we go. We'll look at three levels: the **grand story**, the **region**, and the **local neighborhood**. The Grand Story --------------- Let's assume the overarching Grand Story is a conflict between good and evil. On the Good team, you have the various armies and powers of mankind; and on the evil team, you have the armies of orcs led by an ancient dragon. A major battle between men and orcs would advance the Grand Story, just like an important artifact or location changing hands between them. But the players don't have anything to do with this, at least not at first. For them, the Grand Story is present, but out of their control. So let's break it down further. The Forces of Good ------------------ The good guys consist of three main groups: * the kingdom of Bohania * the principality of Tolbag * the elves of the Wulu Forest All three of these groups have long-standing conflicts with each other that have never been resolved. The only reason they work together at all is because the Evil Team is such a great threat to them all. Some conflicts here: * Bohania claims that Tolbag is a rebellious province that ought to rejoin the kingdom. * Tolbag depends on their income from logging, which is impinging on the Wulu Forest. Local Conflicts --------------- The players start off in Tolbag, as very minor forces for good. In their local neighborhood, there are other conflicts. Elements of the local neighborhood are: * the baron of Wildan, a vassal of the prince of Tolbag * the major landholders of Wildan * Sir Goring, an old knight, a hero from the last war, who holds a small castle in Wildan * the bishop of Wildan * a settlement of goblins in the nearby mountains * the nearby border crossing with Bohania, manned by soldiers of both Bohania and Tolbag All of these elements have a stake in things, and they all have conflicts with other groups. For example: * The baron resents the prince calling up so much of the baron's forces, leaving Wildan nearly undefended. * Sir Goring is publicly agitating for another war against Bohania. He's popular with the people, so the baron can't easily silence him. * The bishop of Wildan is trying to locate the Wand of St. Gifful, a powerful holy relic. * The goblins aren't good guys, but they want nothing to do with the orcs, and would rather stay neutral. * The local landholders aren't too pleased with the goblins' raiding their farms, though. * It's rumored that several regiments of Bohanian soldiers are massing at the border, supposedly to invade orcish territory. What the Party Can Do --------------------- Now even a low-level party can make an impact on things. They could go and fight the goblins (possibly driving them to ally with the orcs) or try and negotiate a peace treaty with them on behalf of the baron. They could work for the baron to help defend the barony. They could go and scout out the Bohanian forces across the border. They could go off looking for the Wand of St. Gifful. None of these actions are likely to have much impact on the *Grand Story*, but they might have some impact on *Tolbag*, and they're very likely to affect the barony of *Wildan*. If you're looking for a very open, sandbox kind of game, just set up the competing elements and let the party loose. They can intervene or not as they see fit, and the Grand Story goes on with or without them. As the party goes up in abilities, they can begin to get involved in higher and higher conflicts, eventually finding themselves as major players in some great war as part of the Grand Story.
This is something I've been struggling with as well... So this will be less an answer, and more a collection of thoughts on the direction I'm going. Hopefully someone with more experience solves it for both of us :) The first note, is that having a campaign where every session deals directly with advancing the plot is a valid way to do things. However, this will make for a very focused story, with less of the sandboxing and exploration commonly associated with RPGs. If you go this route, I'd recommend keeping it relatively short, and giving it a distinct beginning and end (think movie, rather than TV series). If the players fall in love with their characters, you can always write a sequel or move to a more traditional format afterwards. That said, if you want a more traditional semi-free-form campaign, here's what I've been able to scratch together. **Structure** A lot of my inspiration for this sort of thing comes from reading about how TV series are put together. Looking at it this way, it seems like there are three major types of adventures you can have: * "Tent poles" -- These are the major turning points in your narrative. The epic battles, the betrayals, the triumphs, and so on. If you were to write an outline of your plot, these would be the bullet points. * "Canvas" -- For lack of a better term. These are the work-a-day adventures that deal with your central plot. The battles with the villain's henchmen, pawns being moved into place, and so on. Their ordering and timing isn't as important as the tent poles. * "One-shots" -- Adventures not related to the ongoing plot. These help provide a rest from the main plot, and help demonstrate that there are other things going on. You can help integrate them by providing an encounter or two related to the main plot... But the focus of the night should be elsewhere. **Planning** Ideally, you should have your tent poles planned out ahead of time, along with a bank of canvas adventures and one shots to draw on as needed. You may also want to plan a handful of individual plot-related encounters to help populate one-shots that need to be generated on the fly ("Um, you weren't supposed to tick that village off, but whatever."). As a practical matter, I've always had a weakness when it comes to planning, so I usually get by with a couple of tent poles and a few canvas and one-shot adventures thumbnailed (i.e. only planned as a one-sentence description) at any given time. **Threads** I like to have a couple of major plot threads going at any given time. This helps give me material to fill in dead spots, and adds a bit of depth to the world. It also helps provide continuity from one major plot to the next. In planning out threads, remember that it isn't necessary for an antagonist to be completely eliminated for their thread to end for a time... But when they are defeated, be sure and give them some time out of the spotlight. **Pacing** From there, it's a matter of mixing up the types of adventures you provide to the players. Work on the plot, but don't let it dominate the table to such an extent that it feels like the PCs are being singled out. Mix in one-shots to help establish the setting, and to give the players a chance to define themselves as individuals rather than strictly as opponents of the villain. If the players are actively striving along the plot, use traveling and new locations as an opportunity to mix in the one-shots. If the players are wandering, and waiting for the plot to come to them, try to find ways for the players to tangentially encounter what's going on (so it doesn't seem like the plot is actively trying to fight them).
10,337
I've been GMing/DMing on and off for years. I prefer playing. Mainly because when I run a game, I'm more a fly by the seat of your pants kind of dm, and it works sort of.. My problem is that, while I can come up with a grand sweeping overarching campaign plot pretty easily.... I have great difficulty coming up with stuff to do in the individual sessions at all, let alone ones that work along with overarching plot without either leaving it behind or rushing it forward. So I guess my question is this, how do you come up with stuff for the players to do in individual session. Being able to roll with the punches and keep things moving Im pretty good at, but I could really use some advice on what are good ways to come up with the "individual chapters" of the story.
2011/10/06
[ "https://rpg.stackexchange.com/questions/10337", "https://rpg.stackexchange.com", "https://rpg.stackexchange.com/users/2426/" ]
This is something I've been struggling with as well... So this will be less an answer, and more a collection of thoughts on the direction I'm going. Hopefully someone with more experience solves it for both of us :) The first note, is that having a campaign where every session deals directly with advancing the plot is a valid way to do things. However, this will make for a very focused story, with less of the sandboxing and exploration commonly associated with RPGs. If you go this route, I'd recommend keeping it relatively short, and giving it a distinct beginning and end (think movie, rather than TV series). If the players fall in love with their characters, you can always write a sequel or move to a more traditional format afterwards. That said, if you want a more traditional semi-free-form campaign, here's what I've been able to scratch together. **Structure** A lot of my inspiration for this sort of thing comes from reading about how TV series are put together. Looking at it this way, it seems like there are three major types of adventures you can have: * "Tent poles" -- These are the major turning points in your narrative. The epic battles, the betrayals, the triumphs, and so on. If you were to write an outline of your plot, these would be the bullet points. * "Canvas" -- For lack of a better term. These are the work-a-day adventures that deal with your central plot. The battles with the villain's henchmen, pawns being moved into place, and so on. Their ordering and timing isn't as important as the tent poles. * "One-shots" -- Adventures not related to the ongoing plot. These help provide a rest from the main plot, and help demonstrate that there are other things going on. You can help integrate them by providing an encounter or two related to the main plot... But the focus of the night should be elsewhere. **Planning** Ideally, you should have your tent poles planned out ahead of time, along with a bank of canvas adventures and one shots to draw on as needed. You may also want to plan a handful of individual plot-related encounters to help populate one-shots that need to be generated on the fly ("Um, you weren't supposed to tick that village off, but whatever."). As a practical matter, I've always had a weakness when it comes to planning, so I usually get by with a couple of tent poles and a few canvas and one-shot adventures thumbnailed (i.e. only planned as a one-sentence description) at any given time. **Threads** I like to have a couple of major plot threads going at any given time. This helps give me material to fill in dead spots, and adds a bit of depth to the world. It also helps provide continuity from one major plot to the next. In planning out threads, remember that it isn't necessary for an antagonist to be completely eliminated for their thread to end for a time... But when they are defeated, be sure and give them some time out of the spotlight. **Pacing** From there, it's a matter of mixing up the types of adventures you provide to the players. Work on the plot, but don't let it dominate the table to such an extent that it feels like the PCs are being singled out. Mix in one-shots to help establish the setting, and to give the players a chance to define themselves as individuals rather than strictly as opponents of the villain. If the players are actively striving along the plot, use traveling and new locations as an opportunity to mix in the one-shots. If the players are wandering, and waiting for the plot to come to them, try to find ways for the players to tangentially encounter what's going on (so it doesn't seem like the plot is actively trying to fight them).
**Campaign Roadmap** Here's what I do. I have a large scale conceptual roadmap for my campaign, where I have major phases defined. Each arc roadmap is a Word doc with a laundry list of specific adventures and ideas I'm thinking of creating or including (I do a lot of weaving products together). I put it in an approximate likely chronological order/power level, without getting too tied to it. Whichever adventure they go into, I weave some threads that may bring them to one or more next ones. A description is short, it might be "The PCs have been causing too much trouble, so the city's crime lords have a sit-down and vote to have them assassinated by wererats, run a wererat ambush using that goblin wererat the PCs encountered before," or "Salvadora Beckett approaches the PCs and needs their help investigating some occult slayings, if they agree run Carrion Hill." Some are longer term contingencies without any necessary order, like "if Sindawe ever follows up on that treasure map his father gave him, it leads to the Sun Temple Colony (see Lost Cities of Golarion p.XX)." I'd come up with more about that if and when it happened; no sense over-planning things that may not come up (and certainly won't come up in the space of the next session). **The Session Sheet** Then as the PCs approach an adventure's start point (like if they go to Nisroch and I have an adventure or adventure idea to happen while they're there), I prep one or more session sheets. This takes me an hour per hour of game I'm going to run. Each session sheet has three parts. An adventure might be "run this published adventure, but the bad guy is the head cultist from the PCs' last adventure instead of the provided guy." Or it might be "here's a random dungeon I printed out," or "here's the set of random encounters and events for their travel." The first part of my session sheet is the Cast of Characters, and lists all the NPCs the party is likely to come into contact with. I note small stats/descriptions inline, or refer to page numbers, or append PDF character sheets (usually made in Hero Lab) depending on the detail needed. I am a very character drive DM and find that if you have a bunch of good characters around, the rest tends to unfold without a lot of work. This is often nearly a full page of content. The second is the Adventure, where I have specific things that could happen. Listed items could be "if while in port they go to the Gold Goblin, run the 'Cheat the Devil and Take his Gold. adventure from Second Darkness Chapter 1: Shadow in the Sky." Or it might be character interactions, random monster/event tables... The third is Notes, blank initially, where I take notes about what happened in this session specifically with an eye to how the world, NPCs, and the plot may react to their actions. After the session I revisit the plot arc and determine which things have to change or become more or less likely to happen next. By taking elements from previous sessions and putting them into future sessions, you create a coherent plot much more effectively than coming up with a plot you are trying to "keep the players on." My whole session sheet is usually 2-5 pages (not counting Notes) depending on how much is completely original work vs using parts of published products. Obviously often chunks of a session sheet aren't used; they get bumped to the next session or abandoned as appropriate. And it relies a little bit on the players being forthcoming about what they are interested in doing next; if they don't want to say and just want to run in a random direction when the game starts to see what happens, you have larger problems. I don't railroad, but I find that once you have compelling plot threads and personal relationships with people/places/etc in the game the PCs' actions are pretty predictable as to what adventures they will be following up on next. Anyway, this is how I prepare sessions. See my [much longer blog post](http://geek-related.com/2011/10/08/campaign-planning/) inspired by this question for a much more detailed look at how I do it.
10,337
I've been GMing/DMing on and off for years. I prefer playing. Mainly because when I run a game, I'm more a fly by the seat of your pants kind of dm, and it works sort of.. My problem is that, while I can come up with a grand sweeping overarching campaign plot pretty easily.... I have great difficulty coming up with stuff to do in the individual sessions at all, let alone ones that work along with overarching plot without either leaving it behind or rushing it forward. So I guess my question is this, how do you come up with stuff for the players to do in individual session. Being able to roll with the punches and keep things moving Im pretty good at, but I could really use some advice on what are good ways to come up with the "individual chapters" of the story.
2011/10/06
[ "https://rpg.stackexchange.com/questions/10337", "https://rpg.stackexchange.com", "https://rpg.stackexchange.com/users/2426/" ]
One word: **conflicts**. Conflicts drive action and plot. It sounds like you already have a grand scheme, but you want to drive the day-to-day adventuring within it. To get there, I'll build an example as we go. We'll look at three levels: the **grand story**, the **region**, and the **local neighborhood**. The Grand Story --------------- Let's assume the overarching Grand Story is a conflict between good and evil. On the Good team, you have the various armies and powers of mankind; and on the evil team, you have the armies of orcs led by an ancient dragon. A major battle between men and orcs would advance the Grand Story, just like an important artifact or location changing hands between them. But the players don't have anything to do with this, at least not at first. For them, the Grand Story is present, but out of their control. So let's break it down further. The Forces of Good ------------------ The good guys consist of three main groups: * the kingdom of Bohania * the principality of Tolbag * the elves of the Wulu Forest All three of these groups have long-standing conflicts with each other that have never been resolved. The only reason they work together at all is because the Evil Team is such a great threat to them all. Some conflicts here: * Bohania claims that Tolbag is a rebellious province that ought to rejoin the kingdom. * Tolbag depends on their income from logging, which is impinging on the Wulu Forest. Local Conflicts --------------- The players start off in Tolbag, as very minor forces for good. In their local neighborhood, there are other conflicts. Elements of the local neighborhood are: * the baron of Wildan, a vassal of the prince of Tolbag * the major landholders of Wildan * Sir Goring, an old knight, a hero from the last war, who holds a small castle in Wildan * the bishop of Wildan * a settlement of goblins in the nearby mountains * the nearby border crossing with Bohania, manned by soldiers of both Bohania and Tolbag All of these elements have a stake in things, and they all have conflicts with other groups. For example: * The baron resents the prince calling up so much of the baron's forces, leaving Wildan nearly undefended. * Sir Goring is publicly agitating for another war against Bohania. He's popular with the people, so the baron can't easily silence him. * The bishop of Wildan is trying to locate the Wand of St. Gifful, a powerful holy relic. * The goblins aren't good guys, but they want nothing to do with the orcs, and would rather stay neutral. * The local landholders aren't too pleased with the goblins' raiding their farms, though. * It's rumored that several regiments of Bohanian soldiers are massing at the border, supposedly to invade orcish territory. What the Party Can Do --------------------- Now even a low-level party can make an impact on things. They could go and fight the goblins (possibly driving them to ally with the orcs) or try and negotiate a peace treaty with them on behalf of the baron. They could work for the baron to help defend the barony. They could go and scout out the Bohanian forces across the border. They could go off looking for the Wand of St. Gifful. None of these actions are likely to have much impact on the *Grand Story*, but they might have some impact on *Tolbag*, and they're very likely to affect the barony of *Wildan*. If you're looking for a very open, sandbox kind of game, just set up the competing elements and let the party loose. They can intervene or not as they see fit, and the Grand Story goes on with or without them. As the party goes up in abilities, they can begin to get involved in higher and higher conflicts, eventually finding themselves as major players in some great war as part of the Grand Story.
**Campaign Roadmap** Here's what I do. I have a large scale conceptual roadmap for my campaign, where I have major phases defined. Each arc roadmap is a Word doc with a laundry list of specific adventures and ideas I'm thinking of creating or including (I do a lot of weaving products together). I put it in an approximate likely chronological order/power level, without getting too tied to it. Whichever adventure they go into, I weave some threads that may bring them to one or more next ones. A description is short, it might be "The PCs have been causing too much trouble, so the city's crime lords have a sit-down and vote to have them assassinated by wererats, run a wererat ambush using that goblin wererat the PCs encountered before," or "Salvadora Beckett approaches the PCs and needs their help investigating some occult slayings, if they agree run Carrion Hill." Some are longer term contingencies without any necessary order, like "if Sindawe ever follows up on that treasure map his father gave him, it leads to the Sun Temple Colony (see Lost Cities of Golarion p.XX)." I'd come up with more about that if and when it happened; no sense over-planning things that may not come up (and certainly won't come up in the space of the next session). **The Session Sheet** Then as the PCs approach an adventure's start point (like if they go to Nisroch and I have an adventure or adventure idea to happen while they're there), I prep one or more session sheets. This takes me an hour per hour of game I'm going to run. Each session sheet has three parts. An adventure might be "run this published adventure, but the bad guy is the head cultist from the PCs' last adventure instead of the provided guy." Or it might be "here's a random dungeon I printed out," or "here's the set of random encounters and events for their travel." The first part of my session sheet is the Cast of Characters, and lists all the NPCs the party is likely to come into contact with. I note small stats/descriptions inline, or refer to page numbers, or append PDF character sheets (usually made in Hero Lab) depending on the detail needed. I am a very character drive DM and find that if you have a bunch of good characters around, the rest tends to unfold without a lot of work. This is often nearly a full page of content. The second is the Adventure, where I have specific things that could happen. Listed items could be "if while in port they go to the Gold Goblin, run the 'Cheat the Devil and Take his Gold. adventure from Second Darkness Chapter 1: Shadow in the Sky." Or it might be character interactions, random monster/event tables... The third is Notes, blank initially, where I take notes about what happened in this session specifically with an eye to how the world, NPCs, and the plot may react to their actions. After the session I revisit the plot arc and determine which things have to change or become more or less likely to happen next. By taking elements from previous sessions and putting them into future sessions, you create a coherent plot much more effectively than coming up with a plot you are trying to "keep the players on." My whole session sheet is usually 2-5 pages (not counting Notes) depending on how much is completely original work vs using parts of published products. Obviously often chunks of a session sheet aren't used; they get bumped to the next session or abandoned as appropriate. And it relies a little bit on the players being forthcoming about what they are interested in doing next; if they don't want to say and just want to run in a random direction when the game starts to see what happens, you have larger problems. I don't railroad, but I find that once you have compelling plot threads and personal relationships with people/places/etc in the game the PCs' actions are pretty predictable as to what adventures they will be following up on next. Anyway, this is how I prepare sessions. See my [much longer blog post](http://geek-related.com/2011/10/08/campaign-planning/) inspired by this question for a much more detailed look at how I do it.
392,904
How to enable Privacy => Health => COVID-19 Exposure Logging on a iPhone 6S+ device running 13.5.1 in India. Whatever Region I choose, it seems to be disabled and it mentions that its not enabled for the region. We are developing an App using the Exposure Notification specification but aren't in a position to enable the above attribute
2020/06/03
[ "https://apple.stackexchange.com/questions/392904", "https://apple.stackexchange.com", "https://apple.stackexchange.com/users/78477/" ]
Non developers don’t get to enable COVID-19 logging in ares where Apple hasn’t enabled it. Apple has documented volumes of technical data, reasoning, white papers and more: <https://www.apple.com/covid19/contacttracing> If that’s not enough to get you going, since you are developing, you do have an avenue that all consumers lack. Open a developer support ticket with Apple using your developer account to get access to a pre-release OS and register any requests that support development of an app before it’s rolled out. * <https://developer.apple.com> That’s the best way to move forward on this if you can’t wait for it to be rolled into the production OS for your region or you want to see the beta SDK / API so you know what is coming as opposed to what shipped. Also, look at WWDC dates - since that is less than 20 days away, you might wait quite some time for an answer or have to rely on the developer forums / documentation already written as there’s a lot in the air right now on the development side.
The link <https://covid19.apple.com/screening/> appears on apple.com when the country (at the page's bottom) is the US. Moreover, a lot of content there is US centred. If you switch to <https://www.apple.com/in/>, the screening strip at the top disappears. So I think it's not supported in India. It will not be hugely successful either since the number of iPhones per unit people is less in India than in the US. Stick to <https://en.wikipedia.org/wiki/Aarogya_Setu> .
11,245,861
An internal error has occurred. java.lang.NullPointerException ![What's that error](https://i.stack.imgur.com/l2L1Y.jpg) Always appear when i am saving my class or open Manifest file.
2012/06/28
[ "https://Stackoverflow.com/questions/11245861", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1412921/" ]
Goto Project >> Clean >> Clean the project. This should solve the problem.
i've got this exception . when i open the manifest.xml file, after clean the project, i get the same exception.. finally i cleaned the project and closed all files and restarted the eclipse . There after only the problem solved.
73,728
I just noticed [this proposal](http://www.telegraph.co.uk/food-and-drink/news/scientists-discover-sixth-taste---and-it-could-explain-our-love/) that 'starchiness' should be recognised as the sixth primary taste (after sweetness, sourness, saltiness, bitterness, and umami). I've never really been clear on the distinction between a 'primary' taste and any other sort of taste - is this purely about whether the taste is detectable by receptors specifically on the taste buds? I have heard this as an argument against the recognition of 'pungency' ('spiciness') as a taste, since the mechanism of sensing pungency is different, but I believe some cultures do also recognise pungency as a primary taste - so is this a cultural definition, a scientific definition, or neither?
2016/09/05
[ "https://cooking.stackexchange.com/questions/73728", "https://cooking.stackexchange.com", "https://cooking.stackexchange.com/users/50339/" ]
Unless they found a taste receptor, it likely is a part of the texture (including heat conductivity, solubility etc.) part of flavor. Spicy heat actually is related to temperature and texture (triggers heat - as in literal heat - receptors, does not trigger injury receptors and/or temperature receptors deeper in tissue, so we will not mistake spicy for actually dangerously hot). The five/six basic taste system (the sixth being fat, currently being scientifically debated) does not describe flavor completely: It completely ignores the factors of aroma, texture (including how non-flavor ingredients will just mechanically keep most of some flavor compounds from ever getting near your tongue), temperature and their interactions. It assumes that bitterness is one dimensional, which is also debated. Adstringency is considered a separate taste in some cultures, one could also consider it a textural factor (excites tissue in a certain way, just as capsaicin does).
I am currently doing some research on the topic an came across these criteria proposed to constitute a "primary taste" by two research groups: Kurihara & Kashiwayanagi (1998) 1) A primary taste is a characteristic taste which is evidently different from any other primary taste 2) A primary taste is not reproduced by mixing other primary taste stimuli 3) A primary taste is a universal taste induced by components of many foods. If a taste is not often encountered, we do not call it a primary taste, even if it is a unique taste. 4) There are intrinsic taste receptors for a primary taste and single taste neurons specific to the primary taste Running, Craig & Mattes (2015) 1) has ecological consequence 2) is elicited by a distinctive class of chemicals, 3) stems from activation of specialized receptors, 4) is detected through gustatory nerves and is processed in taste centers, 5) has a quality non over-lapping with other primary qualities, evokes a behavioral and/or physiological response Sources: Kurihara, K., & Kashiwayanagi, M. (1998). Introductory remarks on umami taste. Annals of the New York Academy of Sciences, 855(1), 393-397. Running, C. A., Craig, B. A., & Mattes, R. D. (2015). Oleogustus: the unique taste of fat. Chemical senses, 40(7), 507-516.
241,437
When I send dwellers to the wasteland for long periods of time, they usually use their RadAways and Stimpaks. This time, I sent out a dweller with the maximum 25 RadAways and Stimpaks, with a Fatman and Heavy Wasteland gear. I have noticed that she heals, and that her radiation lowers, but her RadAway and Stimpak counters to not decrease. She still has all 25 after 13 hours. I have watched the bars go up and down. I can not tell if this is deliberate, or a bug, but the movements are supported by the log. Is it possible for dwellers to heal, and for their radiation to lower, by themselves?
2015/10/30
[ "https://gaming.stackexchange.com/questions/241437", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/128471/" ]
No, it's not possible for dwellers to heal by themselves in the wasteland. However, dwellers heal all damage when they level up in the wasteland. > > But I don't really know how much health they have, might be important she's level 36, has 7-S, 1-P, 10-E, 6-C, 6-I, 4-A, 4-L. > > > You said it yourself, she is not level 50. There you go. And because she has 10 Endurance, she hardly takes any radiation damage. --- I try to max dweller stats before I send them out to level, so I have a level 8 dweller with 25 stimpacks and high `+E` gear and a big gun take about 2 days before they use the first stimpack. That's because with every level up their health and radiation will reset. In addition, [if they have more than 10 Endurance](https://gaming.stackexchange.com/a/223912/29763), they will never take radiation damage (red bar). ![screenshot](https://i.stack.imgur.com/bkPIy.jpg) I didn't have an undammaged dweller right now, but I think it's obvious that this guy would not survive 4 days with only 6 stimpacks without having some additional healing going on. I believe he was level 8 when I sent him out.
real I might just be possible your dweller did not take any damage in those first 13 hours. I have experienced (anecdotical) that dweller will loose health and eat up stimpacks at an exponential rate (or so it seems); first it goes slowly, then it goes fast.
20,591
I Have an outside deck, it currently has a layer of varnish on it, I Think the wood type is Meranti. The deck is exposed to lots of rain and also harsh sun, and the varnish has started to peel. I Would like to re-seal or repair the finish What would be the best type of product to use, (varnish, solvent based sealer, oil based sealer, water based sealer) etc... And if so, how would that affect the current flaky varnish? I would essentially like a semi-maintenance free application where the wood luster is maintained.
2012/11/08
[ "https://diy.stackexchange.com/questions/20591", "https://diy.stackexchange.com", "https://diy.stackexchange.com/users/7114/" ]
You could take a proactive approach and sand it in any case. This will lead to better paint adhesion which is a good thing. It is also a great idea to wash previously painted surfaces with a strong solution of TSP (tri sodium phosphate). Make sure to use good rubber gloves and hot water - for your protection and best results. The TSP wash does a fantastic jub of getting any gunk off the walls that can interfere with a good paint job. Especially in a bathroom there is always the possibility with soap film and over spray from foam cleaners on the walls and panelling. A strong TSP wash can also remove some of the gloss from a previously painted surface for some types of paint.
[One paint company](http://www.roddapaint.com/product/paint-gloss-sheen.aspx) defines the various finishes as follows: > > * **Satin**: A finish with a low luster appearance. Washable surface, reflects some light. > * **Semi-Gloss**: A finish that has noticable gloss and sheen. Washable, sometimes scrubbable surface, but shows surface > imperfections. Reflects light noticeably > * **Eggshell / Low Gloss**: A finish ½ way between satin and semi-gloss with a noticeable gloss and sheen. Washable, sometimes > scrubbable, but may show surface imperfections. Reflects light > noticeably. > * **Gloss**: A finish with a high degree of gloss and sheen. Scrubbable surface imperfections. Reflects light very well. If > properly applied almost gives the impression of ceramic or glass > finish. > > > They also explain gloss and sheen: > > > * **Gloss**: Measured at a 60° angle, it's the shininess or reflectiveness of a coating. > * **Sheen**: Measured at an 85° angle, it's a moderately low degree of gloss that appears flat when viewed near or perpendicular, but > glossy when viewed from a low or sharp angle. > > > There is no industry standard for paint sheens, so one company's eggshell can be another company's satin, matte or low gloss.
129,095
I've played around in Ancient Egypt for a while and I've noticed all these extra paths hidden behind key gates. Unfortunately, I don't have enough keys to open all the gates. Without purchasing anything, what's the fastest way to mine more Egypt keys?
2013/08/28
[ "https://gaming.stackexchange.com/questions/129095", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/2262/" ]
The keys drop randomly so there isn't a fastest way other than keep playing levels. You may optimize your gameplay by trying to get all the stars, and once you've got them all you'll even have some leftover keys.
Set your day time 2 days after in SETTINGS DATE AND TIME and a treasure yeti should appeared because it's programmed to spawn roughly every day.Just fight him and collect the lunch box which MAY contain 3 keys, if not then there will be 1000 coins
10,935,355
I'm trying to understand how to adopt the fast enumeration protocol (under iOS/objective C) for a class I'm creating. I read the section of Apple's docs, but... I don't quite get it! Anyone have some sample code I could look at? What I'm trying to do: I have an array of objects over which I want a sender to iterate. The sender wants to use a for-in construct. The catch is I don't want the sender to see *all* the objects in the array because some of them aren't valid in the context of the application. In other words, I want my iterator to return a subset of objects in the array matching certain criteria. I'd prefer not to create any *new* arrays in the process so as not to slow things down.
2012/06/07
[ "https://Stackoverflow.com/questions/10935355", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1442620/" ]
Apple's own [FastEnumerationSample](https://developer.apple.com/library/mac/#samplecode/FastEnumerationSample/Introduction/Intro.html) demonstrates it quite well. From the sounds of it, you may not have seen it yet. There's also [this blog post](http://www.mikeash.com/pyblog/friday-qa-2010-04-16-implementing-fast-enumeration.html).
I don't know what you mean by "sender wants to use a for-in construct". The outcome you're asking for would probably be better achieved by using indexesOfObjectsPassingTest:, which will give you an index set of all the items in your array that pass whatever test you have set up for it. You could also use filteredArrayUsingPredicate: to derive a new array that's a subset of your original -- I know you said you didn't want to create any new arrays, but if you want to return a subset of your array, then you have to create a new array.
10,935,355
I'm trying to understand how to adopt the fast enumeration protocol (under iOS/objective C) for a class I'm creating. I read the section of Apple's docs, but... I don't quite get it! Anyone have some sample code I could look at? What I'm trying to do: I have an array of objects over which I want a sender to iterate. The sender wants to use a for-in construct. The catch is I don't want the sender to see *all* the objects in the array because some of them aren't valid in the context of the application. In other words, I want my iterator to return a subset of objects in the array matching certain criteria. I'd prefer not to create any *new* arrays in the process so as not to slow things down.
2012/06/07
[ "https://Stackoverflow.com/questions/10935355", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1442620/" ]
Much better explanation here: <http://www.cocoawithlove.com/2008/05/implementing-countbyenumeratingwithstat.html> NB: Apple's source code is technically correct, but poorly explained, and mostly useless unless you enjoy playing "guess what the programmer was thinking / smoking that day". Liekwise, Mike Ash's post is correct, and useful *after you know how to do it*, but terrible as a starting point.
I don't know what you mean by "sender wants to use a for-in construct". The outcome you're asking for would probably be better achieved by using indexesOfObjectsPassingTest:, which will give you an index set of all the items in your array that pass whatever test you have set up for it. You could also use filteredArrayUsingPredicate: to derive a new array that's a subset of your original -- I know you said you didn't want to create any new arrays, but if you want to return a subset of your array, then you have to create a new array.
10,935,355
I'm trying to understand how to adopt the fast enumeration protocol (under iOS/objective C) for a class I'm creating. I read the section of Apple's docs, but... I don't quite get it! Anyone have some sample code I could look at? What I'm trying to do: I have an array of objects over which I want a sender to iterate. The sender wants to use a for-in construct. The catch is I don't want the sender to see *all* the objects in the array because some of them aren't valid in the context of the application. In other words, I want my iterator to return a subset of objects in the array matching certain criteria. I'd prefer not to create any *new* arrays in the process so as not to slow things down.
2012/06/07
[ "https://Stackoverflow.com/questions/10935355", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1442620/" ]
Apple's own [FastEnumerationSample](https://developer.apple.com/library/mac/#samplecode/FastEnumerationSample/Introduction/Intro.html) demonstrates it quite well. From the sounds of it, you may not have seen it yet. There's also [this blog post](http://www.mikeash.com/pyblog/friday-qa-2010-04-16-implementing-fast-enumeration.html).
Much better explanation here: <http://www.cocoawithlove.com/2008/05/implementing-countbyenumeratingwithstat.html> NB: Apple's source code is technically correct, but poorly explained, and mostly useless unless you enjoy playing "guess what the programmer was thinking / smoking that day". Liekwise, Mike Ash's post is correct, and useful *after you know how to do it*, but terrible as a starting point.
19,265,728
We are running NodeJS server on Heroku. we want to know whether heroku will restart the application if application crashes. Also will there any different behavior between free version and paid version?
2013/10/09
[ "https://Stackoverflow.com/questions/19265728", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1154350/" ]
It will. For several times, and then "cool off" for ten minutes and try again. From the docs: > > Heroku’s dyno restart policy is to try to restart crashed dynos by spawning new dynos once every ten minutes. This means that if you push bad code that prevents your app from booting, your app dynos will be started once, then restarted, then get a cool-off of ten minutes. In the normal case of a long-running web or worker process getting an occasional crash, the dyno will be restarted instantly without any intervention on your part. If your dyno crashes twice in a row, it will stay down for ten minutes before the system retries. > > > The docs: <https://devcenter.heroku.com/articles/dynos#automatic-dyno-restarts> **EDIT** Regarding free dynos: the restart behavior is the same. However, there is something called "Dyno Idling" which happens only in free dynos. Basically it means that if your dyno does not receive any request for 1 hour it will "go to sleep", and the next request will "wake it up", which will cause that next request to be slightly delayed. This happens only when you have 1 free `web` dyno for your app. To circumvent that, either have 2 dynos (and then *none* of them will idle, but you will be paying for one), or have "something" poll your web dyno every (say) 30 minutes. Like pingdom, say. The docs: <https://devcenter.heroku.com/articles/dynos#automatic-dyno-restarts>
Fast-forward to 2022, Go to your app on the Heroku portal Click on "More" dropdown Select "Restart all dynos" [![enter image description here](https://i.stack.imgur.com/C5CGJ.png)](https://i.stack.imgur.com/C5CGJ.png)
305,322
I do not see anything suspicious on the server (no netstat connections to remote 80 port), but I'm not a professional server admin (I'm a hardcore software developer). Please do not write obvious comments (hire a professional person/company) - we'll consider that after this issue is resolved. Server is running under Windows Server 2008 R2. What tools should I use to analyze this situation? **This is not an exact duplicate of multiple "what should I do if my server is hacked" as I basically need to provide evidence that my server is clean.** Basic security measures were taken since the beginning (windows firewall on, windows update pataches applied, Clamwin up and running).
2011/08/26
[ "https://serverfault.com/questions/305322", "https://serverfault.com", "https://serverfault.com/users/53770/" ]
> > Please do not write obvious comments (hire a professional > person/company) - we'll consider that after this issue is resolved. > > > I'm sorry to say that you are not managing that security incident the right way then. If there's a fire in your house, are you waiting for it to extinguish itself before calling the fire-fighters? If you have nobody in staff that can handle that type of incident, then you should get help from external resources that can manage security breach.
Ask your ISP to produce logs showing your server's involvement in the incident (a suspicious traffic graph, for example, generated by data from your ISP's routers or switches). If they can produce such evidence, your system is suspect. If your machine was in fact involved in a DoS attack and you didn't initiate such action yourself your machine is almost certainly compromised. If your system is compromised the best advice you will get is to blow it away, as in [How do I deal with a compromised server?](https://serverfault.com/questions/218005/my-servers-been-hacked-emergency) or any of the other questions similar to it. For determining if your system was hacked, remember that you cannot rely on *any* tools installed on the system, and that a good attacker will leave no obvious trails (except possibly odd traffic, noted by an external system). If you have any suspicion that your system *was* compromised, it ***is*** still compromised until it is rebuilt with known clean media and software.
305,322
I do not see anything suspicious on the server (no netstat connections to remote 80 port), but I'm not a professional server admin (I'm a hardcore software developer). Please do not write obvious comments (hire a professional person/company) - we'll consider that after this issue is resolved. Server is running under Windows Server 2008 R2. What tools should I use to analyze this situation? **This is not an exact duplicate of multiple "what should I do if my server is hacked" as I basically need to provide evidence that my server is clean.** Basic security measures were taken since the beginning (windows firewall on, windows update pataches applied, Clamwin up and running).
2011/08/26
[ "https://serverfault.com/questions/305322", "https://serverfault.com", "https://serverfault.com/users/53770/" ]
> > Please do not write obvious comments (hire a professional > person/company) - we'll consider that after this issue is resolved. > > > I'm sorry to say that you are not managing that security incident the right way then. If there's a fire in your house, are you waiting for it to extinguish itself before calling the fire-fighters? If you have nobody in staff that can handle that type of incident, then you should get help from external resources that can manage security breach.
You can never be sure your system isn't compromised. You can only implement reasonable security and integrity for your system based on the importance of system uptime, reliability, integrity etc. You can't reasonably be asked to secure your system without the know how.
305,322
I do not see anything suspicious on the server (no netstat connections to remote 80 port), but I'm not a professional server admin (I'm a hardcore software developer). Please do not write obvious comments (hire a professional person/company) - we'll consider that after this issue is resolved. Server is running under Windows Server 2008 R2. What tools should I use to analyze this situation? **This is not an exact duplicate of multiple "what should I do if my server is hacked" as I basically need to provide evidence that my server is clean.** Basic security measures were taken since the beginning (windows firewall on, windows update pataches applied, Clamwin up and running).
2011/08/26
[ "https://serverfault.com/questions/305322", "https://serverfault.com", "https://serverfault.com/users/53770/" ]
> > Please do not write obvious comments (hire a professional > person/company) - we'll consider that after this issue is resolved. > > > I'm sorry to say that you are not managing that security incident the right way then. If there's a fire in your house, are you waiting for it to extinguish itself before calling the fire-fighters? If you have nobody in staff that can handle that type of incident, then you should get help from external resources that can manage security breach.
Our ex-hosting company gave us a bad IP address when we got a new server. They then turned around and accused us of spamming because the IP address was in a spammer blacklist somewhere on the web. After a lot of wasted time we found that it was actually a previous customer of theirs had done done the spamming from that IP address. Make them prove to you what happened, when it happened, who reported it etc. AFAIK anyone can report an ip address to most of these sites without much proof
305,322
I do not see anything suspicious on the server (no netstat connections to remote 80 port), but I'm not a professional server admin (I'm a hardcore software developer). Please do not write obvious comments (hire a professional person/company) - we'll consider that after this issue is resolved. Server is running under Windows Server 2008 R2. What tools should I use to analyze this situation? **This is not an exact duplicate of multiple "what should I do if my server is hacked" as I basically need to provide evidence that my server is clean.** Basic security measures were taken since the beginning (windows firewall on, windows update pataches applied, Clamwin up and running).
2011/08/26
[ "https://serverfault.com/questions/305322", "https://serverfault.com", "https://serverfault.com/users/53770/" ]
> > Please do not write obvious comments (hire a professional > person/company) - we'll consider that after this issue is resolved. > > > I'm sorry to say that you are not managing that security incident the right way then. If there's a fire in your house, are you waiting for it to extinguish itself before calling the fire-fighters? If you have nobody in staff that can handle that type of incident, then you should get help from external resources that can manage security breach.
Just because your server isn't executing a DDoS attack **now** doesn't mean it hasn't done so earlier, and it **certainly** doesn't mean that your server isn't hacked. If the DC has traffic logs showing your server participating in an attack, then that should be all the evidence you need. Getting a copy of the logs might help you to determine what's wrong with your server -- pay particular attention to timing. This isn't a job for someone with *average* admin training. Tracking this stuff down can be *hard* and requires you to use every trick you know and a lot of tricks you don't. You may be looking for a very tiny needle in a very large haystack. Even experienced admins have trouble with this sort of stuff.
305,322
I do not see anything suspicious on the server (no netstat connections to remote 80 port), but I'm not a professional server admin (I'm a hardcore software developer). Please do not write obvious comments (hire a professional person/company) - we'll consider that after this issue is resolved. Server is running under Windows Server 2008 R2. What tools should I use to analyze this situation? **This is not an exact duplicate of multiple "what should I do if my server is hacked" as I basically need to provide evidence that my server is clean.** Basic security measures were taken since the beginning (windows firewall on, windows update pataches applied, Clamwin up and running).
2011/08/26
[ "https://serverfault.com/questions/305322", "https://serverfault.com", "https://serverfault.com/users/53770/" ]
Ask your ISP to produce logs showing your server's involvement in the incident (a suspicious traffic graph, for example, generated by data from your ISP's routers or switches). If they can produce such evidence, your system is suspect. If your machine was in fact involved in a DoS attack and you didn't initiate such action yourself your machine is almost certainly compromised. If your system is compromised the best advice you will get is to blow it away, as in [How do I deal with a compromised server?](https://serverfault.com/questions/218005/my-servers-been-hacked-emergency) or any of the other questions similar to it. For determining if your system was hacked, remember that you cannot rely on *any* tools installed on the system, and that a good attacker will leave no obvious trails (except possibly odd traffic, noted by an external system). If you have any suspicion that your system *was* compromised, it ***is*** still compromised until it is rebuilt with known clean media and software.
You can never be sure your system isn't compromised. You can only implement reasonable security and integrity for your system based on the importance of system uptime, reliability, integrity etc. You can't reasonably be asked to secure your system without the know how.
305,322
I do not see anything suspicious on the server (no netstat connections to remote 80 port), but I'm not a professional server admin (I'm a hardcore software developer). Please do not write obvious comments (hire a professional person/company) - we'll consider that after this issue is resolved. Server is running under Windows Server 2008 R2. What tools should I use to analyze this situation? **This is not an exact duplicate of multiple "what should I do if my server is hacked" as I basically need to provide evidence that my server is clean.** Basic security measures were taken since the beginning (windows firewall on, windows update pataches applied, Clamwin up and running).
2011/08/26
[ "https://serverfault.com/questions/305322", "https://serverfault.com", "https://serverfault.com/users/53770/" ]
Ask your ISP to produce logs showing your server's involvement in the incident (a suspicious traffic graph, for example, generated by data from your ISP's routers or switches). If they can produce such evidence, your system is suspect. If your machine was in fact involved in a DoS attack and you didn't initiate such action yourself your machine is almost certainly compromised. If your system is compromised the best advice you will get is to blow it away, as in [How do I deal with a compromised server?](https://serverfault.com/questions/218005/my-servers-been-hacked-emergency) or any of the other questions similar to it. For determining if your system was hacked, remember that you cannot rely on *any* tools installed on the system, and that a good attacker will leave no obvious trails (except possibly odd traffic, noted by an external system). If you have any suspicion that your system *was* compromised, it ***is*** still compromised until it is rebuilt with known clean media and software.
Our ex-hosting company gave us a bad IP address when we got a new server. They then turned around and accused us of spamming because the IP address was in a spammer blacklist somewhere on the web. After a lot of wasted time we found that it was actually a previous customer of theirs had done done the spamming from that IP address. Make them prove to you what happened, when it happened, who reported it etc. AFAIK anyone can report an ip address to most of these sites without much proof
305,322
I do not see anything suspicious on the server (no netstat connections to remote 80 port), but I'm not a professional server admin (I'm a hardcore software developer). Please do not write obvious comments (hire a professional person/company) - we'll consider that after this issue is resolved. Server is running under Windows Server 2008 R2. What tools should I use to analyze this situation? **This is not an exact duplicate of multiple "what should I do if my server is hacked" as I basically need to provide evidence that my server is clean.** Basic security measures were taken since the beginning (windows firewall on, windows update pataches applied, Clamwin up and running).
2011/08/26
[ "https://serverfault.com/questions/305322", "https://serverfault.com", "https://serverfault.com/users/53770/" ]
Ask your ISP to produce logs showing your server's involvement in the incident (a suspicious traffic graph, for example, generated by data from your ISP's routers or switches). If they can produce such evidence, your system is suspect. If your machine was in fact involved in a DoS attack and you didn't initiate such action yourself your machine is almost certainly compromised. If your system is compromised the best advice you will get is to blow it away, as in [How do I deal with a compromised server?](https://serverfault.com/questions/218005/my-servers-been-hacked-emergency) or any of the other questions similar to it. For determining if your system was hacked, remember that you cannot rely on *any* tools installed on the system, and that a good attacker will leave no obvious trails (except possibly odd traffic, noted by an external system). If you have any suspicion that your system *was* compromised, it ***is*** still compromised until it is rebuilt with known clean media and software.
Just because your server isn't executing a DDoS attack **now** doesn't mean it hasn't done so earlier, and it **certainly** doesn't mean that your server isn't hacked. If the DC has traffic logs showing your server participating in an attack, then that should be all the evidence you need. Getting a copy of the logs might help you to determine what's wrong with your server -- pay particular attention to timing. This isn't a job for someone with *average* admin training. Tracking this stuff down can be *hard* and requires you to use every trick you know and a lot of tricks you don't. You may be looking for a very tiny needle in a very large haystack. Even experienced admins have trouble with this sort of stuff.
305,322
I do not see anything suspicious on the server (no netstat connections to remote 80 port), but I'm not a professional server admin (I'm a hardcore software developer). Please do not write obvious comments (hire a professional person/company) - we'll consider that after this issue is resolved. Server is running under Windows Server 2008 R2. What tools should I use to analyze this situation? **This is not an exact duplicate of multiple "what should I do if my server is hacked" as I basically need to provide evidence that my server is clean.** Basic security measures were taken since the beginning (windows firewall on, windows update pataches applied, Clamwin up and running).
2011/08/26
[ "https://serverfault.com/questions/305322", "https://serverfault.com", "https://serverfault.com/users/53770/" ]
Our ex-hosting company gave us a bad IP address when we got a new server. They then turned around and accused us of spamming because the IP address was in a spammer blacklist somewhere on the web. After a lot of wasted time we found that it was actually a previous customer of theirs had done done the spamming from that IP address. Make them prove to you what happened, when it happened, who reported it etc. AFAIK anyone can report an ip address to most of these sites without much proof
You can never be sure your system isn't compromised. You can only implement reasonable security and integrity for your system based on the importance of system uptime, reliability, integrity etc. You can't reasonably be asked to secure your system without the know how.
305,322
I do not see anything suspicious on the server (no netstat connections to remote 80 port), but I'm not a professional server admin (I'm a hardcore software developer). Please do not write obvious comments (hire a professional person/company) - we'll consider that after this issue is resolved. Server is running under Windows Server 2008 R2. What tools should I use to analyze this situation? **This is not an exact duplicate of multiple "what should I do if my server is hacked" as I basically need to provide evidence that my server is clean.** Basic security measures were taken since the beginning (windows firewall on, windows update pataches applied, Clamwin up and running).
2011/08/26
[ "https://serverfault.com/questions/305322", "https://serverfault.com", "https://serverfault.com/users/53770/" ]
You can never be sure your system isn't compromised. You can only implement reasonable security and integrity for your system based on the importance of system uptime, reliability, integrity etc. You can't reasonably be asked to secure your system without the know how.
Just because your server isn't executing a DDoS attack **now** doesn't mean it hasn't done so earlier, and it **certainly** doesn't mean that your server isn't hacked. If the DC has traffic logs showing your server participating in an attack, then that should be all the evidence you need. Getting a copy of the logs might help you to determine what's wrong with your server -- pay particular attention to timing. This isn't a job for someone with *average* admin training. Tracking this stuff down can be *hard* and requires you to use every trick you know and a lot of tricks you don't. You may be looking for a very tiny needle in a very large haystack. Even experienced admins have trouble with this sort of stuff.
305,322
I do not see anything suspicious on the server (no netstat connections to remote 80 port), but I'm not a professional server admin (I'm a hardcore software developer). Please do not write obvious comments (hire a professional person/company) - we'll consider that after this issue is resolved. Server is running under Windows Server 2008 R2. What tools should I use to analyze this situation? **This is not an exact duplicate of multiple "what should I do if my server is hacked" as I basically need to provide evidence that my server is clean.** Basic security measures were taken since the beginning (windows firewall on, windows update pataches applied, Clamwin up and running).
2011/08/26
[ "https://serverfault.com/questions/305322", "https://serverfault.com", "https://serverfault.com/users/53770/" ]
Our ex-hosting company gave us a bad IP address when we got a new server. They then turned around and accused us of spamming because the IP address was in a spammer blacklist somewhere on the web. After a lot of wasted time we found that it was actually a previous customer of theirs had done done the spamming from that IP address. Make them prove to you what happened, when it happened, who reported it etc. AFAIK anyone can report an ip address to most of these sites without much proof
Just because your server isn't executing a DDoS attack **now** doesn't mean it hasn't done so earlier, and it **certainly** doesn't mean that your server isn't hacked. If the DC has traffic logs showing your server participating in an attack, then that should be all the evidence you need. Getting a copy of the logs might help you to determine what's wrong with your server -- pay particular attention to timing. This isn't a job for someone with *average* admin training. Tracking this stuff down can be *hard* and requires you to use every trick you know and a lot of tricks you don't. You may be looking for a very tiny needle in a very large haystack. Even experienced admins have trouble with this sort of stuff.
19,354
I came to [this article](http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html) from another comment on Crypto StackExchange. After reading it, I am wondering if there is any benefit to using a digital signature on unencrypted S/MIME emails?
2014/09/27
[ "https://crypto.stackexchange.com/questions/19354", "https://crypto.stackexchange.com", "https://crypto.stackexchange.com/users/10565/" ]
The article you linked to predates the S/MIME 3.2 spec. If your client is sending S/MIME 3.2 messages, it should support header protection. Refer to [RFC 5751 Section 3.1](https://www.rfc-editor.org/rfc/rfc5751#section-3.1): > > In order to protect outer, non-content-related message header fields > (for instance, the "Subject", "To", "From", and "Cc" fields), the > sending client MAY wrap a full MIME message in a message/rfc822 > wrapper in order to apply S/MIME security services to these header > fields. It is up to the receiving client to decide how to present > this "inner" header along with the unprotected "outer" header. > > > When an S/MIME message is received, if the top-level protected MIME > entity has a Content-Type of message/rfc822, it can be assumed that > the intent was to provide header protection. This entity SHOULD be > presented as the top-level message, taking into account header > merging issues as previously discussed. > > > S/MIME 3.2 should be fine for encryption, authentication, nonrepudiation, or any combination thereof. Since the header is being signed, including TO and FROM attributes, that defeats the impersonation attack described by the link. So yes, the benefit S/MIME signing an cleartext message would be authentication and nonrepudiation - if your X.509 certificate includes digitalSignature and nonRepudiation as KeyUsages, that is (see [RFC 2459 Section 4.2.1.3](https://www.ietf.org/rfc/rfc2459)).
Yes, of course there is a benefit to signing unencrypted emails. The article you cite is solely about the combination of signature and encryption; it doesn't directly say anything about signing unencrypted emails. There is an important concern raised by the article which does apply to unencrypted emails, but that's because that concern applies equally whether the email is encrypted or not. The problem is that only the body of the email is signed. So when you receive a signed email (whether it's encrypted or not), you need to be careful not to implicitly assume anything about the context of the email. For example, when Alice signs “I love you” and sends it to Bob, Eve can forward the message to Charlie; Charlie will then see a signed message, guaranteed to have been written by Alice, and saying “I love you”. Charlie might assume that because he received the email, the “you” in the email is him; but this association is not warranted. All that Charlie can know is that Alice declared her love to someone, but not who that someone is. If Alice had wanted to send an unambiguous message, she should have signed “Dear Bob, I love you”.
19,354
I came to [this article](http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html) from another comment on Crypto StackExchange. After reading it, I am wondering if there is any benefit to using a digital signature on unencrypted S/MIME emails?
2014/09/27
[ "https://crypto.stackexchange.com/questions/19354", "https://crypto.stackexchange.com", "https://crypto.stackexchange.com/users/10565/" ]
The article you linked to predates the S/MIME 3.2 spec. If your client is sending S/MIME 3.2 messages, it should support header protection. Refer to [RFC 5751 Section 3.1](https://www.rfc-editor.org/rfc/rfc5751#section-3.1): > > In order to protect outer, non-content-related message header fields > (for instance, the "Subject", "To", "From", and "Cc" fields), the > sending client MAY wrap a full MIME message in a message/rfc822 > wrapper in order to apply S/MIME security services to these header > fields. It is up to the receiving client to decide how to present > this "inner" header along with the unprotected "outer" header. > > > When an S/MIME message is received, if the top-level protected MIME > entity has a Content-Type of message/rfc822, it can be assumed that > the intent was to provide header protection. This entity SHOULD be > presented as the top-level message, taking into account header > merging issues as previously discussed. > > > S/MIME 3.2 should be fine for encryption, authentication, nonrepudiation, or any combination thereof. Since the header is being signed, including TO and FROM attributes, that defeats the impersonation attack described by the link. So yes, the benefit S/MIME signing an cleartext message would be authentication and nonrepudiation - if your X.509 certificate includes digitalSignature and nonRepudiation as KeyUsages, that is (see [RFC 2459 Section 4.2.1.3](https://www.ietf.org/rfc/rfc2459)).
The benefit to signing a non-encrypted email is that any recipient can verify that it was indeed you who wrote that non-encrypted email, unless your key was compromised (or the signing protocol has an exploit).
19,354
I came to [this article](http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html) from another comment on Crypto StackExchange. After reading it, I am wondering if there is any benefit to using a digital signature on unencrypted S/MIME emails?
2014/09/27
[ "https://crypto.stackexchange.com/questions/19354", "https://crypto.stackexchange.com", "https://crypto.stackexchange.com/users/10565/" ]
Yes, of course there is a benefit to signing unencrypted emails. The article you cite is solely about the combination of signature and encryption; it doesn't directly say anything about signing unencrypted emails. There is an important concern raised by the article which does apply to unencrypted emails, but that's because that concern applies equally whether the email is encrypted or not. The problem is that only the body of the email is signed. So when you receive a signed email (whether it's encrypted or not), you need to be careful not to implicitly assume anything about the context of the email. For example, when Alice signs “I love you” and sends it to Bob, Eve can forward the message to Charlie; Charlie will then see a signed message, guaranteed to have been written by Alice, and saying “I love you”. Charlie might assume that because he received the email, the “you” in the email is him; but this association is not warranted. All that Charlie can know is that Alice declared her love to someone, but not who that someone is. If Alice had wanted to send an unambiguous message, she should have signed “Dear Bob, I love you”.
The benefit to signing a non-encrypted email is that any recipient can verify that it was indeed you who wrote that non-encrypted email, unless your key was compromised (or the signing protocol has an exploit).
13,223
Can anything from a molded house be safely moved to a new house without any further harm for health? Can spores be wiped out from clothes and furniture?
2017/08/04
[ "https://health.stackexchange.com/questions/13223", "https://health.stackexchange.com", "https://health.stackexchange.com/users/11040/" ]
The [CDC has a great website on cleanup after mold](https://www.cdc.gov/mold/cleanup.htm). Also, this is a [simple pamphlet](https://www.cdc.gov/disasters/hurricanes/pdf/flyer-get-rid-of-mold.pdf). The degree of decontamination needed **depends on the item and the extent of the mold**. Whether something needs to be thrown out depends on multiple factors. There is too long a list to give a full discussion here, but the fundamentals include: * Bleach can kill spores. Some clothing can be bleached. Nonporous surfaces can be scrubbed with bleach. Carpets cannot, drywall cannot, generally furniture cannot. * Not everything requires bleach, like clothing/sheets can generally be washed on heavy cycle with detergent in very hot water. * If mold did not directly grow on an item, sometimes it can be cleaned in other ways, so read about the specific circumstances. E.g. furniture steam cleaning or shampooing can be successful, depending on degree of mold. * When handling items contaminated with significant amounts of mold, or in a mold-damaged area of the house, wear a respirator mask capable of filtering mold spores (N95) and other protective equipment so that you don't contaminate other areas. Mold has known deleterious health effects, so especially if you have allergies to mold, make sure you do read the CDC recommendations if you've experienced mold problems. Spores can be transported to a new location and grow there if it encounters favorable circumstances (damp rooms, leaking roof, etc).
*Note: this is my personal experience, not a scientific opinion or anything like that. I hope it helps.* I had a similar situation to you three years ago. We moved out of the damp apartment, full of black mould. We cleaned all of our furniture with ordinary upholstery shampoo, washed our clothes with normal detergent, etc. We then moved to a nice, dry apartment. No doubt some spores remained on the clothes, etc. However, they did not cause any health effects that we know of. We have moved several times since then and have never had symptoms of anything. The spores need moisture to grow into mould, or they'll die.
9,029
The dictionary says that a “turnaround” is “an abrupt or unexpected change, esp. one that results in a more favorable situation”. What would be the word for “an abrupt or unexpected change” which is NOT favourable and worsens the situation?
2011/01/17
[ "https://english.stackexchange.com/questions/9029", "https://english.stackexchange.com", "https://english.stackexchange.com/users/3724/" ]
I cannot think of a *word* but two good expressions would be: > > * take a turn for the worse > * take a nosedive > > >
Don't hold me to this but 'upset' as a verb can mean overtun and to become overturned. Because of the way we use it day to day. I feel like it's taken on a *mainly* pejorative sense.
9,029
The dictionary says that a “turnaround” is “an abrupt or unexpected change, esp. one that results in a more favorable situation”. What would be the word for “an abrupt or unexpected change” which is NOT favourable and worsens the situation?
2011/01/17
[ "https://english.stackexchange.com/questions/9029", "https://english.stackexchange.com", "https://english.stackexchange.com/users/3724/" ]
The word could be *reversal*. Here are links to [OED Online](http://oxforddictionaries.com/view/entry/m_en_gb0707270#m_en_gb0707270) and [Merriam Webster](http://www.merriam-webster.com/dictionary/reversal). > > Many Internet firms have suffered a painful reversal of fortune. > > >
I cannot think of a *word* but two good expressions would be: > > * take a turn for the worse > * take a nosedive > > >
9,029
The dictionary says that a “turnaround” is “an abrupt or unexpected change, esp. one that results in a more favorable situation”. What would be the word for “an abrupt or unexpected change” which is NOT favourable and worsens the situation?
2011/01/17
[ "https://english.stackexchange.com/questions/9029", "https://english.stackexchange.com", "https://english.stackexchange.com/users/3724/" ]
I cannot think of a *word* but two good expressions would be: > > * take a turn for the worse > * take a nosedive > > >
I would suggest calling it "a disaster."
9,029
The dictionary says that a “turnaround” is “an abrupt or unexpected change, esp. one that results in a more favorable situation”. What would be the word for “an abrupt or unexpected change” which is NOT favourable and worsens the situation?
2011/01/17
[ "https://english.stackexchange.com/questions/9029", "https://english.stackexchange.com", "https://english.stackexchange.com/users/3724/" ]
I cannot think of a *word* but two good expressions would be: > > * take a turn for the worse > * take a nosedive > > >
"Turnarounds" are rarely unexpected, in the context of economics, or the fortunes of people or individual companies. More often, it has the sense of "self-rescue". I like Jimi Oke's "take a turn for the worse".
9,029
The dictionary says that a “turnaround” is “an abrupt or unexpected change, esp. one that results in a more favorable situation”. What would be the word for “an abrupt or unexpected change” which is NOT favourable and worsens the situation?
2011/01/17
[ "https://english.stackexchange.com/questions/9029", "https://english.stackexchange.com", "https://english.stackexchange.com/users/3724/" ]
I cannot think of a *word* but two good expressions would be: > > * take a turn for the worse > * take a nosedive > > >
For an unexpected change of fortune, I can think of an optimistic word... Because colloquially we plan for our plans to succeed one can usually use the optimistic term **setback** [OED](https://en.oxforddictionaries.com/definition/setback "OED"). Example: "The injury of their star player was a significant *setback* for the team."
9,029
The dictionary says that a “turnaround” is “an abrupt or unexpected change, esp. one that results in a more favorable situation”. What would be the word for “an abrupt or unexpected change” which is NOT favourable and worsens the situation?
2011/01/17
[ "https://english.stackexchange.com/questions/9029", "https://english.stackexchange.com", "https://english.stackexchange.com/users/3724/" ]
The word could be *reversal*. Here are links to [OED Online](http://oxforddictionaries.com/view/entry/m_en_gb0707270#m_en_gb0707270) and [Merriam Webster](http://www.merriam-webster.com/dictionary/reversal). > > Many Internet firms have suffered a painful reversal of fortune. > > >
Don't hold me to this but 'upset' as a verb can mean overtun and to become overturned. Because of the way we use it day to day. I feel like it's taken on a *mainly* pejorative sense.
9,029
The dictionary says that a “turnaround” is “an abrupt or unexpected change, esp. one that results in a more favorable situation”. What would be the word for “an abrupt or unexpected change” which is NOT favourable and worsens the situation?
2011/01/17
[ "https://english.stackexchange.com/questions/9029", "https://english.stackexchange.com", "https://english.stackexchange.com/users/3724/" ]
The word could be *reversal*. Here are links to [OED Online](http://oxforddictionaries.com/view/entry/m_en_gb0707270#m_en_gb0707270) and [Merriam Webster](http://www.merriam-webster.com/dictionary/reversal). > > Many Internet firms have suffered a painful reversal of fortune. > > >
I would suggest calling it "a disaster."
9,029
The dictionary says that a “turnaround” is “an abrupt or unexpected change, esp. one that results in a more favorable situation”. What would be the word for “an abrupt or unexpected change” which is NOT favourable and worsens the situation?
2011/01/17
[ "https://english.stackexchange.com/questions/9029", "https://english.stackexchange.com", "https://english.stackexchange.com/users/3724/" ]
The word could be *reversal*. Here are links to [OED Online](http://oxforddictionaries.com/view/entry/m_en_gb0707270#m_en_gb0707270) and [Merriam Webster](http://www.merriam-webster.com/dictionary/reversal). > > Many Internet firms have suffered a painful reversal of fortune. > > >
"Turnarounds" are rarely unexpected, in the context of economics, or the fortunes of people or individual companies. More often, it has the sense of "self-rescue". I like Jimi Oke's "take a turn for the worse".
9,029
The dictionary says that a “turnaround” is “an abrupt or unexpected change, esp. one that results in a more favorable situation”. What would be the word for “an abrupt or unexpected change” which is NOT favourable and worsens the situation?
2011/01/17
[ "https://english.stackexchange.com/questions/9029", "https://english.stackexchange.com", "https://english.stackexchange.com/users/3724/" ]
The word could be *reversal*. Here are links to [OED Online](http://oxforddictionaries.com/view/entry/m_en_gb0707270#m_en_gb0707270) and [Merriam Webster](http://www.merriam-webster.com/dictionary/reversal). > > Many Internet firms have suffered a painful reversal of fortune. > > >
For an unexpected change of fortune, I can think of an optimistic word... Because colloquially we plan for our plans to succeed one can usually use the optimistic term **setback** [OED](https://en.oxforddictionaries.com/definition/setback "OED"). Example: "The injury of their star player was a significant *setback* for the team."
13,808,321
Is there an Android standard or coding convention / best practice that says whether or not an app should Exit (not running in background) or minimize (running in background) when the user "backs-out" of an app? For example, you are on the home page of an app. What is the best-practice for handling the back press? The obvious answer is to let android handle it's own back button press, which in turn exits the app. But is it okay to override and minimize?
2012/12/10
[ "https://Stackoverflow.com/questions/13808321", "https://Stackoverflow.com", "https://Stackoverflow.com/users/657936/" ]
Maybe this will help "App follows Android Design guidelines and uses common UI patterns and icons: App does not redefine the expected function of a system icon (such as the Back button)". [Android Core Standard Policies](http://developer.android.com/distribute/googleplay/quality/core.html)
That depends on the kind of application you are making in my opinion. If for example you have an application that needs to save something to a database or whatever when the user clicks the back button, I would agree you just minimize the app. But even then, after the app has done saving, it should exit. But if possible I would suggest you exit the application, this will also let the phone free up memory/CPU which can be used by other applications etc. It will also save battery. And of course, this is the expected behaviour for an Android user: If you go back, you close the application. You don't want to confuse your users ;-)
223,875
Somehow, all my mp3 and jpg images on my backup network drive are fine, but my local computer has the creation time BIGGER then the modified time (modified time is the right one). Now, every time I want to create backup (using robocopy) it copies everything because he thinks the files are newer! How do I fix all the local files to have Creation time = Modified time ? OS: Windows 7 64 bit
2010/12/20
[ "https://superuser.com/questions/223875", "https://superuser.com", "https://superuser.com/users/7716/" ]
Jail breaking. Other than that, there is no way to do it as the built-in bluetooth functions don't allow that.
The only way right now is using the [Wi-Fi Sync](http://getwifisync.com/) jailbreak app, but it's only compatible with Windows and Mac, not Linux.
8,990
The unsubscribe via email does not use the correct email address. I have "myname"@gmail.com but when I send a test it adds this strange email address u.77.3.61020d9ae6a273d5@gmail.com as the email address.
2016/01/20
[ "https://civicrm.stackexchange.com/questions/8990", "https://civicrm.stackexchange.com", "https://civicrm.stackexchange.com/users/2328/" ]
in order to use civimail, you need to have your own domain name for to manage the bounces, and it's the same address used for the unsubscribe (it adds to the address that weird u.xxx string that you see to be able to distinguish between your contacts who is actually unsubscribing or bouncing, it's called VERP). It doesn't use any of your "normal" mailboxes, it needs a dedicated one to handle automatically bounces and unsubscribe. For what I see, you haven't properly set-up your email account in civimail and use a gmail address (and didn't fill the local part) <http://book.civicrm.org/user/advanced-configuration/email-system-configuration/>
It sounds like you haven't set up your email system correctly. This is the sub-address part of the email but it is missing the local part. Go to Administer > CiviMail > Mail accounts and set 'local part' to be 'myname+'. See the manual for more details: [Email system configuration](https://book.civicrm.org/user/advanced-configuration/email-system-configuration/)
95,181
As per [my previous question](https://raspberrypi.stackexchange.com/questions/95180/distro-which-is-preconfigured-to-support-xtp2046-display), I am having great difficulty with a headless setup, so have decided to add a display. I possibly ***could*** use my HDMI input TV, but I don't think that my partner would be too pleased. I have access to: * my laptop, but they generally don't have video in * a desktop, but its monitor only has VGA-in and DVD-in * an XTP2046 display, but my previous question explains that I can't find a distro to support it * the display dead 3 year old laptop * an Amazon fire tablet & an Android tablet, plus an Amazon smart 'phone I suspect that my best options are to use the TV temporarily, if I can get access to it, and longer term to buy a very cheap HDMI monitor, but does anyone have any other ideas? My only caveat is that I must be a able to use a standard distro, without editting any files. Perhaps I could aso buy a cheap Pi display, so long as it requires no messing with the SD card? Latest: and HDMI to VGA adapter for less than $5 looks promising for use wiht the desktop's monitor
2019/03/10
[ "https://raspberrypi.stackexchange.com/questions/95181", "https://raspberrypi.stackexchange.com", "https://raspberrypi.stackexchange.com/users/7019/" ]
The Pi Zero-W has a mini HDMI port. HDMI is somewhat intercompatible with DVI. Buy the appropriate adapter and/or cable and connect the Pi to the DVI input on your monitor. You will need either a Mini-HDMI to HDMI adapter (which you might already have) and an [HDMI to DVI cable](https://www.ebuyer.com/130512-xenta-hdmi-to-dvi-d-cable-1m-plex-033), or a [Mini HDMI to DVI cable](https://www.amazon.co.uk/StarTech-com-Mini-HDMI-DVI-D-Cable-Black/dp/B00GJ40AD8).
If you don't have monitor available then you can try to configure your Pi Zero W as Ethernet gadget and connect it to you PC via USB without setting up WiFi. I was doing it myself a couple of years ago and it was relatively easy to get response via SSH. If you have Windows machine then you can try this great [tutorial](http://www.circuitbasics.com/raspberry-pi-zero-ethernet-gadget/). It's written for Pi Zero, but with Zero W it also should work just fine. The only thing that you need is micro-USB cable. You can also search other similar tutorials with keywords "Raspberry Zero Ethernet gadget tutorial". Do you have HDMI monitor available for couple of hours and do you have mini-HDMI cable/adapter to set up WiFi and SSH? This could make your life much easier.
361,564
I have a one to one NAT on pfsense that assigns a public IP to an internal IP (running a web server). When I open the public IP from an internal machine, it will not resolve to the internal IP, instead it opens the router web page. When I open the public IP from outside my LAN it will go through to the internal IP that is running the web server. Why can't I open the public IP internally?
2012/02/19
[ "https://serverfault.com/questions/361564", "https://serverfault.com", "https://serverfault.com/users/35991/" ]
I'm also guessing it will be the hairpin NAT issue as mentioned above. There are lots of different names for the same thing - pfSense calls this NAT Reflection. At the bottom of the relevant NAT/port forward rule, check the 2nd option from the bottom - NAT reflection should be enabled. The change the default for new rules, you can go to system, advanced, Firewall/NAT then under the Network Address Translation section, uncheck the first box that says Disable NAT Reflection for port forwards. Also depending on your setup, you may need to disable the HTTP\_REFERER and DNS Rebinding checks under System, Advanced, Admin Access. However I would try with the checks enabled first.
Your router's web-based administration is on port 80, so when an inside machine accesses the router on port 80, that's what they get. Moving the router's web administration to another port (typically 8000 or 8080) might fix the problem, unless the router doesn't support hairpin NAT (NATing connections from the inside back to the inside) at all.
126,146
Let's suppose (for simplicity) that we have an application featuring client and server; is there a better idea to use one repository for both or a pair of separate repositories? Mixing them will probably make easier to track correlated changes and maintain correlated branches (i.e. protocol evolution), but on the other hand will make the individual development more cluttered...
2011/12/20
[ "https://softwareengineering.stackexchange.com/questions/126146", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/2051/" ]
This is a configuration management problem, not a revision control problem. As always, a programmer using a screwdriver to hammer in a nail. Work out how you will manage you configurations, the the revision control will take care of itself.
Forget about the repository for a moment. How would you organize the two projects on your machine if you weren't sharing with anyone? How would the rest of the team do it? Would you... * Put all the source files for both client and server in the same directory? * Create a main project directory that contains subdirectories for the client and the server? * Keep the two projects completely separate? Once you come to some consensus about that as a team, you're ready to check the projects into your code repository. All the revision control tools that I can think of are happy to reproduce any directory structure you like -- they don't care one bit about which file belongs to which project. And the difference between having one repository or two (or six) is usually not that great, aside from minor administrative differences. For example, with Subversion, the biggest difference between separate repositories for client and server and a single combined repository is in the way the revision numbers change. With a singe repository, the version number will increase each time you commit code to either client or server. With separate repositories, a commit to the server project won't change the head revision number for the client.
126,146
Let's suppose (for simplicity) that we have an application featuring client and server; is there a better idea to use one repository for both or a pair of separate repositories? Mixing them will probably make easier to track correlated changes and maintain correlated branches (i.e. protocol evolution), but on the other hand will make the individual development more cluttered...
2011/12/20
[ "https://softwareengineering.stackexchange.com/questions/126146", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/2051/" ]
The *simplest* approach is to use a single repository, so unless you like complexity for complexity's sake, then that should be the default choice in the absence of compelling arguments otherwise. Is the client and server development going to be carried out by different organisations? Will there be multiple implementations of the client (or server)? Is the client open source and the server implementation secret? If the answer to all these questions is "No", then anything more complex than a single repository is likely to bring only inconvenience for no benefit. If you do choose to maintain separate codebases, you will need clear policies about how this is administered, in order to avoid incompatibilities and dependency hell. After working through the first few hiccups, you might end up discovering that the safest thing is to always check out both repositories together, build them together, and deploy them together...which obviously defeats the whole purpose of separating them! Modularity is a nice property to have, but splitting repositories is not a tool to achieve that. As the previous paragraph implies, you can have highly coupled components that are split over multiple codebases (undesirable), and likewise you can have highly modular components within the same codebase (desirable). On more than one occasion, I have advocated (successfully) for my team to merge existing git repositories, because it simplified development and deployment.
Forget about the repository for a moment. How would you organize the two projects on your machine if you weren't sharing with anyone? How would the rest of the team do it? Would you... * Put all the source files for both client and server in the same directory? * Create a main project directory that contains subdirectories for the client and the server? * Keep the two projects completely separate? Once you come to some consensus about that as a team, you're ready to check the projects into your code repository. All the revision control tools that I can think of are happy to reproduce any directory structure you like -- they don't care one bit about which file belongs to which project. And the difference between having one repository or two (or six) is usually not that great, aside from minor administrative differences. For example, with Subversion, the biggest difference between separate repositories for client and server and a single combined repository is in the way the revision numbers change. With a singe repository, the version number will increase each time you commit code to either client or server. With separate repositories, a commit to the server project won't change the head revision number for the client.
126,146
Let's suppose (for simplicity) that we have an application featuring client and server; is there a better idea to use one repository for both or a pair of separate repositories? Mixing them will probably make easier to track correlated changes and maintain correlated branches (i.e. protocol evolution), but on the other hand will make the individual development more cluttered...
2011/12/20
[ "https://softwareengineering.stackexchange.com/questions/126146", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/2051/" ]
Separate! In fact, I'd probably have three repositories, one for the Client and corresponding client-only libraries, one for the Server (and corresponding libraries), and one for the shared libraries (incorporating the API interfaces that expose the functionality between the two, plus any other shared code). I think that's really the key, the shared code should go into a separate repository of its own. That way you can make sure that the interoperability between your client and server is both always at the same version AND is isolated from the design of each of its consumers. Obviously, this is not always possible, depending on the particular communication framework you're using, but there's likely to be shared code that dictates the format of the data-transfer objects or the handshake steps in your custom protocol (or some other example). Assuming you have a fairly decent Continuous Integration and QA setup (a fairly large assumption, in my experience, but one I'm going to make nonetheless. If you don't have a QA department you should at least get some CI) you shouldn't need to use the single-repo pattern as a defense against possible code mis-matches, either your CI server will flag up library-interoperability or your QA team will catch runtime errors (or, even better, your Unit Tests will). The benefits of split repositories lie in the ability to separately version separate parts of a system. Want to take a copy of last week's Server and run it with this week's Client, to try and lock down the root of a performance issue? No worries.
Forget about the repository for a moment. How would you organize the two projects on your machine if you weren't sharing with anyone? How would the rest of the team do it? Would you... * Put all the source files for both client and server in the same directory? * Create a main project directory that contains subdirectories for the client and the server? * Keep the two projects completely separate? Once you come to some consensus about that as a team, you're ready to check the projects into your code repository. All the revision control tools that I can think of are happy to reproduce any directory structure you like -- they don't care one bit about which file belongs to which project. And the difference between having one repository or two (or six) is usually not that great, aside from minor administrative differences. For example, with Subversion, the biggest difference between separate repositories for client and server and a single combined repository is in the way the revision numbers change. With a singe repository, the version number will increase each time you commit code to either client or server. With separate repositories, a commit to the server project won't change the head revision number for the client.
126,146
Let's suppose (for simplicity) that we have an application featuring client and server; is there a better idea to use one repository for both or a pair of separate repositories? Mixing them will probably make easier to track correlated changes and maintain correlated branches (i.e. protocol evolution), but on the other hand will make the individual development more cluttered...
2011/12/20
[ "https://softwareengineering.stackexchange.com/questions/126146", "https://softwareengineering.stackexchange.com", "https://softwareengineering.stackexchange.com/users/2051/" ]
Separate! In fact, I'd probably have three repositories, one for the Client and corresponding client-only libraries, one for the Server (and corresponding libraries), and one for the shared libraries (incorporating the API interfaces that expose the functionality between the two, plus any other shared code). I think that's really the key, the shared code should go into a separate repository of its own. That way you can make sure that the interoperability between your client and server is both always at the same version AND is isolated from the design of each of its consumers. Obviously, this is not always possible, depending on the particular communication framework you're using, but there's likely to be shared code that dictates the format of the data-transfer objects or the handshake steps in your custom protocol (or some other example). Assuming you have a fairly decent Continuous Integration and QA setup (a fairly large assumption, in my experience, but one I'm going to make nonetheless. If you don't have a QA department you should at least get some CI) you shouldn't need to use the single-repo pattern as a defense against possible code mis-matches, either your CI server will flag up library-interoperability or your QA team will catch runtime errors (or, even better, your Unit Tests will). The benefits of split repositories lie in the ability to separately version separate parts of a system. Want to take a copy of last week's Server and run it with this week's Client, to try and lock down the root of a performance issue? No worries.
This is a configuration management problem, not a revision control problem. As always, a programmer using a screwdriver to hammer in a nail. Work out how you will manage you configurations, the the revision control will take care of itself.
96,108
In HTLC, after all the parties have locked their funds in the contract, claiming payment happens in a reverse way, starting with the receiver who reveals the preimage of the corresponding payment hash. **What would be the problem if it had started with the sender?** After the receiver confirms receipt of the contract, it sends an acknowledgment to sender. Sender releases preimage, timelock set in increasing order across the path, contract initiated by sender having the least locktime. Receiver is the last node to settle the payment. [![enter image description here](https://i.stack.imgur.com/6cSbF.png)](https://i.stack.imgur.com/6cSbF.png) For reference, I am adding a picture so that one can visualize what I am trying to say.
2020/05/23
[ "https://bitcoin.stackexchange.com/questions/96108", "https://bitcoin.stackexchange.com", "https://bitcoin.stackexchange.com/users/105880/" ]
> > Node A is holding a chain which is not in sync with the rest of the nodes and node A decides to post a transaction. > > > Your node, that is not synced, will only let you spend outputs that it has validated as unspent. So in your scenario step 1 may not be able to happen depending on age of the UTXO and what block your node is at. An old node that is not synced can only spend old coins that haven't moved. A more detailed answer from A. Chow: <https://bitcoin.stackexchange.com/a/91822/26873>
> > Node A is holding a chain which is not in sync with the rest of the > nodes and node A decides to post a transaction. > > > If node A created transaction from valid unspent UTXO (which is valid on longest chain), the transaction will be valid. You don't have to be even a node to send this valid, signed transaction, you can mail it to the node C which will include it into mempool. > > The miners will pick up this transaction and add them to a block in > their own chain which is different than Node A's chain. > > > As long as your node has communication with these miners, yes (there are different scenarios of "unsyncing", I assume hardforks as well, but I guessed you meant orphan blocks mostly, or lack of recent blocks?). > > So now when Node A looks at the network, will it just ignore its own > inconsistent chain and pick the miners chain? > > > No. If you are looking at top of chain A which isn't in sync with the longest chain, where miners should add the transaction, your node won't see it. The rest of the network on the longest chain will observe it though. > > Will the transaction made by node A even show up in the blockchain? > > > Yes, in the longest chain.
48,861
How do I find data to build customer journey maps? I ran some surveys but I don't think that survey answers are useful enough to build a customer journey map. I don't have enough emotional data, but I don't know how to get them. Maybe through interviews? And in this case, the interview have to be made before the dev of the website or service, or after that this is already developed? I'm asking this question because, before start working on my project I ran some survey to get insights from users, to shape the experience. But I noticed that data I got aren't enough useful to know their emotion during the use of the site. Lastly: at what stage in a project would it be the right time to develop a customer journey map?
2013/12/09
[ "https://ux.stackexchange.com/questions/48861", "https://ux.stackexchange.com", "https://ux.stackexchange.com/users/36029/" ]
Customer journey maps are frequently used in the **designing of the experience.** Once you have a product idea, **list functionality and features you'd like to include**. Then, **interview potential users/customers.** This is when you discover their **needs and emotions.** At his point, you have not yet built your product, so you don't know how they feel as they are using it (it doesn't exist). However, you do know how they feel in general when they are in need of completing the task, which will be accomplished in your product. For example, if the task is to share a link with a friend, we can identify the common emotions and problems users face with this task: * Eager to share quickly * Desire to share across platforms (some friends use WhatsApp while others use Google Hangouts or Facebook) * Frustration of accessibility on some devices (it's difficult to select, copy, and paste on small phones) Think without limitations, the **ideal way** for the user to complete the task. This is the user journey. Once you identify the user's needs and wants, you can now prioritize your list of **functionality and features**. Then, after you achieve prioritization, you begin to **frame the designs**. Sometimes, if the product is already built, we may observe users using the product. Gather their emotions, needs, and wants through research. Then, we could step back and develop the ideal experience/user journey once again, and contrast the ideal to the existing experience.
I would suggest producing a Customer Experience Map (CEM) based on user needs to map the transitions in the customer journey. Then create content/offers/interactions to track movement along the journey to track interest and engagement. I have created some content covers/title and showed them to user and ask them if they would read or share this. I then ask them about their affinity to the product or service to determine their state of mind in the CEM. This will align your content offers with the state in your digital marketing system.
48,861
How do I find data to build customer journey maps? I ran some surveys but I don't think that survey answers are useful enough to build a customer journey map. I don't have enough emotional data, but I don't know how to get them. Maybe through interviews? And in this case, the interview have to be made before the dev of the website or service, or after that this is already developed? I'm asking this question because, before start working on my project I ran some survey to get insights from users, to shape the experience. But I noticed that data I got aren't enough useful to know their emotion during the use of the site. Lastly: at what stage in a project would it be the right time to develop a customer journey map?
2013/12/09
[ "https://ux.stackexchange.com/questions/48861", "https://ux.stackexchange.com", "https://ux.stackexchange.com/users/36029/" ]
Customer journey maps are frequently used in the **designing of the experience.** Once you have a product idea, **list functionality and features you'd like to include**. Then, **interview potential users/customers.** This is when you discover their **needs and emotions.** At his point, you have not yet built your product, so you don't know how they feel as they are using it (it doesn't exist). However, you do know how they feel in general when they are in need of completing the task, which will be accomplished in your product. For example, if the task is to share a link with a friend, we can identify the common emotions and problems users face with this task: * Eager to share quickly * Desire to share across platforms (some friends use WhatsApp while others use Google Hangouts or Facebook) * Frustration of accessibility on some devices (it's difficult to select, copy, and paste on small phones) Think without limitations, the **ideal way** for the user to complete the task. This is the user journey. Once you identify the user's needs and wants, you can now prioritize your list of **functionality and features**. Then, after you achieve prioritization, you begin to **frame the designs**. Sometimes, if the product is already built, we may observe users using the product. Gather their emotions, needs, and wants through research. Then, we could step back and develop the ideal experience/user journey once again, and contrast the ideal to the existing experience.
Here are some of the ways the Customer Journey Map can help: 1) Alignment across the board 2) Deeper Customer Insights 3) Opportunity to increase top-line growth 4) Create a unified experience across multiple services and products More details can be found at [What is a Customer Journey Map and why is it important?](https://www.ideatheorem.com/insights/what-is-customer-journey-map-why-is-it-important/)
48,861
How do I find data to build customer journey maps? I ran some surveys but I don't think that survey answers are useful enough to build a customer journey map. I don't have enough emotional data, but I don't know how to get them. Maybe through interviews? And in this case, the interview have to be made before the dev of the website or service, or after that this is already developed? I'm asking this question because, before start working on my project I ran some survey to get insights from users, to shape the experience. But I noticed that data I got aren't enough useful to know their emotion during the use of the site. Lastly: at what stage in a project would it be the right time to develop a customer journey map?
2013/12/09
[ "https://ux.stackexchange.com/questions/48861", "https://ux.stackexchange.com", "https://ux.stackexchange.com/users/36029/" ]
I would suggest producing a Customer Experience Map (CEM) based on user needs to map the transitions in the customer journey. Then create content/offers/interactions to track movement along the journey to track interest and engagement. I have created some content covers/title and showed them to user and ask them if they would read or share this. I then ask them about their affinity to the product or service to determine their state of mind in the CEM. This will align your content offers with the state in your digital marketing system.
Here are some of the ways the Customer Journey Map can help: 1) Alignment across the board 2) Deeper Customer Insights 3) Opportunity to increase top-line growth 4) Create a unified experience across multiple services and products More details can be found at [What is a Customer Journey Map and why is it important?](https://www.ideatheorem.com/insights/what-is-customer-journey-map-why-is-it-important/)
14,287,800
When writing in a language such as C, the compiler theoretically takes your human readable code and translates it into machine code - relatively hardware-dependent atomic instructions. Each CPU architecture seems to have an Instruction Set which is implemented for the CPU in some sort of hard-wired way, yet it seems that different CPUs can implement the same ISA in different ways, say x86. Does this mean that an ISA essentially acts as an abstraction layer for the hardware? x86 says: These are the standard instructions that I offer - you don't need to know HOW the hardware does it, just know that it does and you can use them by sending me the following machine code? Thus, if I were to construct a new CPU and I implemented my CPU in such a way that it followed the x86 standard, I would not need to write a compiler specific to my hardware, but that any compiler which compiled from C to the x86 ISA would be sufficient for my new CPU?
2013/01/11
[ "https://Stackoverflow.com/questions/14287800", "https://Stackoverflow.com", "https://Stackoverflow.com/users/1356561/" ]
If you're US based, this API should meet your needs: <https://www.zipcodeapi.com> It's made specifically to find distance between two zip codes, tells you the long-lat for zip codes, find all zips relative to a location, etc.
1. Get postcode northings eastings data free from ordinance survey (credit them on your webpage to get free) 2 calculate distance from the appropriate csv flat file (M.csv contains all manchester postcodes and north and eastness). 3. Distance is sqrt((n1-n2)\*\*2 +(e1-e2)\*\*2) - excuse my fortran 4. If its slow,and you want an approximate distance create a small database of first half postcodes averages so you are looking up M20 not M20 3nb. 5 NB google don't like you using their postcode apis outside google Maps. 6. I am wondering about an algorithm so that for short distances, if you are looking at places close to a postcode, you just search M postcodes for a M postcode (and maybe nearby post areas like SK, OL, if you have a table of adjacent postcode areas). 7 Any body taken this further?
115,080
You can look at a root as the 0th overtone, but in minor do you know some "deductive" reason for the -2nd overtone to be a root of the minor chord? An illustrating explaining what I'm talking about: [![enter image description here](https://i.stack.imgur.com/Dlgj1.png)](https://i.stack.imgur.com/Dlgj1.png)
2021/06/07
[ "https://music.stackexchange.com/questions/115080", "https://music.stackexchange.com", "https://music.stackexchange.com/users/56902/" ]
It sounds like you're homing in on the idea of **harmonic dualism**, a concept heavily discussed by nineteenth-century German music theorists. In short, the notion of harmonic dualism states that, if major triads are built upwards from the overtones of a given root/fundamental, the minor triad is built downwards by finding different roots/fundamentals that generate that starting tone. Thus, starting on C, the opening partials of the C harmonic series create C, E, and G. But moving downwards from that same C, the first fundamentals to create that C end up being F, A♭, and C. I've briefly discussed dualism further in my answer to [Is the IV chord a perfect fifth in disguise?](https://music.stackexchange.com/q/56528/21766) Harmonic dualism is experiencing something of a comeback these days in its updated guise of negative harmony. If you're interested, check out the [negative-harmony](/questions/tagged/negative-harmony "show questions tagged 'negative-harmony'") tag.
The minor scale descending IS very close to a major scale: major asc. = C (+2) D (+2) E (+1) F (+2) G (+2) A (+2) B (+1) C min desc. = C (-2) B♭(-2) A♭(-1) G (-2) F (-2) E♭ (-1) D (-2) C So the only difference is the interpolation of the last two steps. If you replace the D in the min descending with D♭, then you have A♭ Major or f minor. It's actually a pretty interesting observation, but to answer your question in a simpler way-- the 2nd overtone of a series is the dominant, so the 2nd "subtone" would be that inverted: the subdominant.
169,070
i have a hard drive, with 2 partitions. drive C:, D:, and ofcourse my dvd-rom drive which is E: i have a compressed file on my D: and its roughly 1.3 gigs, but when i try to decompress it to the same D: drive, it comes back and says I don't have enough space on my C: drive, and suddenly, i have 0bytes available. i went to disk cleanup, cleared out my temp, but i only got 500megs out of that. what the heck just happened?! ive never ever seen this before!
2010/07/28
[ "https://superuser.com/questions/169070", "https://superuser.com", "https://superuser.com/users/44433/" ]
Add a new share to the server (i.e.: root) that contains all the other shares as subfolders/links. Then you'll be able to map a drive letter to it.
Using a File Manager may help? Servant Salamander (shareware) has a "Change Directory" command (Shift+F7) that allows you to enter something like: \\NAS which does take me to the root of the NAS. (I cannot confirm that this works on W7 at this time, cause the NAS is on an XP system, though it does work on XP & I seem to recall it working on W7.) (Additionally Salamander can see the Windows Network links so something like \\NAS\MUSIC or \\NAS\VIDEO are available.) (I named my Buffalo NAS, "NAS".) "Altap Salamander" <http://www.altap.cz/salam_en/index.html>
5,481
What can I do with DLNA on an android smartphone? I understand it allows wireless streaming media, but beyond that I have trouble finding details. Will DLNA enabled smartphones receive data from servers? Will I be able to hit "play" on my smartphone and listen to it on my DLNA enabled stereo?
2011/01/31
[ "https://android.stackexchange.com/questions/5481", "https://android.stackexchange.com", "https://android.stackexchange.com/users/2199/" ]
An Android phone with DLNA should be able to both send and receive. My Galaxy S uses an app called AllShare to manage it, and there are others like 2Player in the Market. I'm sure you could stream to your stereo.
This app from Qualcomm uses DLNA to play your media from your phone: <http://www.appbrain.com/app/skifta-beta/com.skifta.android.app>
5,481
What can I do with DLNA on an android smartphone? I understand it allows wireless streaming media, but beyond that I have trouble finding details. Will DLNA enabled smartphones receive data from servers? Will I be able to hit "play" on my smartphone and listen to it on my DLNA enabled stereo?
2011/01/31
[ "https://android.stackexchange.com/questions/5481", "https://android.stackexchange.com", "https://android.stackexchange.com/users/2199/" ]
An Android phone with DLNA should be able to both send and receive. My Galaxy S uses an app called AllShare to manage it, and there are others like 2Player in the Market. I'm sure you could stream to your stereo.
DLNA-enabled TVs, for example, can be used as an external monitor without HDMI or any cables. I want to show my large family my vacation pics on my phone but the screen is too small for all of them to see at once. My TV should be Wi-Fi enabled and DLNA-certified and I should have a wireless router too, obviously. * Connect my phone and TV\* to the same Wifi network coming from the same router. * Using the brand appropriate "device media sharing" program\*\* on my phone and TV I connect them to each other. * Now I select the video, picture or music file to play and it will be play through my home Wifi network to my TV and maybe vice versa. So everyone can enjoy at once. \*The same can be done with a DLNA enabled music player or anything. \*\*Media appropriate app can be found by searching up on Google or Youtube or any other search engine.
2,422,362
[Extends](https://stackoverflow.com/questions/743507/what-kind-of-uml-diagrams-do-you-use) Say you're looking at the 6 basic types of UML diagram (from this The Elements Of UML 2.0 Style) 1. Class diagrams 2. Use case diagrams 3. State machine diagrams 4. Activity diagram 5. Sequence diagram 6. Physical diagram Pretend you're insane and you feel like drawing up all 6 diagrams for your system. Which would you start with? Then which would you go to? What's the best order to visit each diagram if you have a **pretty clear** idea of what you want your system to do? I think you should start with the physical diagram and work your way to class diagram. Top down, I always say..? Am I wrong?
2010/03/11
[ "https://Stackoverflow.com/questions/2422362", "https://Stackoverflow.com", "https://Stackoverflow.com/users/111307/" ]
*Use cases* are the main ones that define "what" your system **does**, possibly followed by state machines and activity diagrams (which could be seen either way -- normally the activity diagrams are more about the "what" and the state machines more about the "how", but I've seen counterexamples to each); class and sequence diagrams, and even more so component and deployment ones (collectively the "physical"), are more and more about **how** your system does what it does. I'd definitely go from the "what" towards the "how" as the reverse sequence makes little sense -- how can "how" make sense if you haven't defined the "what"? So, summarizing, roughly: use cases, activity, state machine, class, sequence, component, deployment. This order makes sense because it gets deeper towards the implementation aspects and away from the analysis aspects, so e.g. somebody interested in understanding exactly what use cases you'll cater to and what business rules you'll apply (activity diagrams) may stop "reading" earlier than somebody who needs to understand the full detailed logic of your deployment strategy.
Physical diagram is probably as good a place to start as any. I find activity diagrams really helpful in working out the kinks in a design, and sequences are good for much the same reason. I've rarely bothered with state machine diagrams. I think realistically you're going to want to revisit whatever design you do first anyway (iterated design, woo!) so it's probably worth starting with whatever is going to bring the most clarity to your project.
2,422,362
[Extends](https://stackoverflow.com/questions/743507/what-kind-of-uml-diagrams-do-you-use) Say you're looking at the 6 basic types of UML diagram (from this The Elements Of UML 2.0 Style) 1. Class diagrams 2. Use case diagrams 3. State machine diagrams 4. Activity diagram 5. Sequence diagram 6. Physical diagram Pretend you're insane and you feel like drawing up all 6 diagrams for your system. Which would you start with? Then which would you go to? What's the best order to visit each diagram if you have a **pretty clear** idea of what you want your system to do? I think you should start with the physical diagram and work your way to class diagram. Top down, I always say..? Am I wrong?
2010/03/11
[ "https://Stackoverflow.com/questions/2422362", "https://Stackoverflow.com", "https://Stackoverflow.com/users/111307/" ]
Class, sequence and usecase diagram represents over 90% of usually created diagram inside a project. Class diagram itself sometimes represents more diagram than all the other diagrams. The best solution is to keep it simple and adapt the modeling to the level of the team. **If no UML experience** then just create class diagram to represent the skeleton of your application. **If beginner** level then start with an usecase, sequence and class diagram. **If medium level** then use all the diagrams because each diagram cover another view which is not always possible to code with Java. I mean that java is only related to class and sequence diagram.
Physical diagram is probably as good a place to start as any. I find activity diagrams really helpful in working out the kinks in a design, and sequences are good for much the same reason. I've rarely bothered with state machine diagrams. I think realistically you're going to want to revisit whatever design you do first anyway (iterated design, woo!) so it's probably worth starting with whatever is going to bring the most clarity to your project.
2,422,362
[Extends](https://stackoverflow.com/questions/743507/what-kind-of-uml-diagrams-do-you-use) Say you're looking at the 6 basic types of UML diagram (from this The Elements Of UML 2.0 Style) 1. Class diagrams 2. Use case diagrams 3. State machine diagrams 4. Activity diagram 5. Sequence diagram 6. Physical diagram Pretend you're insane and you feel like drawing up all 6 diagrams for your system. Which would you start with? Then which would you go to? What's the best order to visit each diagram if you have a **pretty clear** idea of what you want your system to do? I think you should start with the physical diagram and work your way to class diagram. Top down, I always say..? Am I wrong?
2010/03/11
[ "https://Stackoverflow.com/questions/2422362", "https://Stackoverflow.com", "https://Stackoverflow.com/users/111307/" ]
*Use cases* are the main ones that define "what" your system **does**, possibly followed by state machines and activity diagrams (which could be seen either way -- normally the activity diagrams are more about the "what" and the state machines more about the "how", but I've seen counterexamples to each); class and sequence diagrams, and even more so component and deployment ones (collectively the "physical"), are more and more about **how** your system does what it does. I'd definitely go from the "what" towards the "how" as the reverse sequence makes little sense -- how can "how" make sense if you haven't defined the "what"? So, summarizing, roughly: use cases, activity, state machine, class, sequence, component, deployment. This order makes sense because it gets deeper towards the implementation aspects and away from the analysis aspects, so e.g. somebody interested in understanding exactly what use cases you'll cater to and what business rules you'll apply (activity diagrams) may stop "reading" earlier than somebody who needs to understand the full detailed logic of your deployment strategy.
UML diagrams are depictions of various models of a design. I am not sure that they can be cleanly serialized the way you describe. Frequently a class diagram is used in both the analysis and design phases of a process. Similarly other diagrams are used in multiple phases. It depends on which aspect of a design you are interested in at any point in time you use the appropriate diagram to "view" a model of the design. I have seen both "start with class diagram" and "start with use case model" proposed. I have come to realize that it really does not matter. I think you want to start with the high level behaviour of the system using several diagrams then gradually work your way down to more detailed design using the same set of diagrams.
2,422,362
[Extends](https://stackoverflow.com/questions/743507/what-kind-of-uml-diagrams-do-you-use) Say you're looking at the 6 basic types of UML diagram (from this The Elements Of UML 2.0 Style) 1. Class diagrams 2. Use case diagrams 3. State machine diagrams 4. Activity diagram 5. Sequence diagram 6. Physical diagram Pretend you're insane and you feel like drawing up all 6 diagrams for your system. Which would you start with? Then which would you go to? What's the best order to visit each diagram if you have a **pretty clear** idea of what you want your system to do? I think you should start with the physical diagram and work your way to class diagram. Top down, I always say..? Am I wrong?
2010/03/11
[ "https://Stackoverflow.com/questions/2422362", "https://Stackoverflow.com", "https://Stackoverflow.com/users/111307/" ]
Class, sequence and usecase diagram represents over 90% of usually created diagram inside a project. Class diagram itself sometimes represents more diagram than all the other diagrams. The best solution is to keep it simple and adapt the modeling to the level of the team. **If no UML experience** then just create class diagram to represent the skeleton of your application. **If beginner** level then start with an usecase, sequence and class diagram. **If medium level** then use all the diagrams because each diagram cover another view which is not always possible to code with Java. I mean that java is only related to class and sequence diagram.
UML diagrams are depictions of various models of a design. I am not sure that they can be cleanly serialized the way you describe. Frequently a class diagram is used in both the analysis and design phases of a process. Similarly other diagrams are used in multiple phases. It depends on which aspect of a design you are interested in at any point in time you use the appropriate diagram to "view" a model of the design. I have seen both "start with class diagram" and "start with use case model" proposed. I have come to realize that it really does not matter. I think you want to start with the high level behaviour of the system using several diagrams then gradually work your way down to more detailed design using the same set of diagrams.
2,422,362
[Extends](https://stackoverflow.com/questions/743507/what-kind-of-uml-diagrams-do-you-use) Say you're looking at the 6 basic types of UML diagram (from this The Elements Of UML 2.0 Style) 1. Class diagrams 2. Use case diagrams 3. State machine diagrams 4. Activity diagram 5. Sequence diagram 6. Physical diagram Pretend you're insane and you feel like drawing up all 6 diagrams for your system. Which would you start with? Then which would you go to? What's the best order to visit each diagram if you have a **pretty clear** idea of what you want your system to do? I think you should start with the physical diagram and work your way to class diagram. Top down, I always say..? Am I wrong?
2010/03/11
[ "https://Stackoverflow.com/questions/2422362", "https://Stackoverflow.com", "https://Stackoverflow.com/users/111307/" ]
*Use cases* are the main ones that define "what" your system **does**, possibly followed by state machines and activity diagrams (which could be seen either way -- normally the activity diagrams are more about the "what" and the state machines more about the "how", but I've seen counterexamples to each); class and sequence diagrams, and even more so component and deployment ones (collectively the "physical"), are more and more about **how** your system does what it does. I'd definitely go from the "what" towards the "how" as the reverse sequence makes little sense -- how can "how" make sense if you haven't defined the "what"? So, summarizing, roughly: use cases, activity, state machine, class, sequence, component, deployment. This order makes sense because it gets deeper towards the implementation aspects and away from the analysis aspects, so e.g. somebody interested in understanding exactly what use cases you'll cater to and what business rules you'll apply (activity diagrams) may stop "reading" earlier than somebody who needs to understand the full detailed logic of your deployment strategy.
Class, sequence and usecase diagram represents over 90% of usually created diagram inside a project. Class diagram itself sometimes represents more diagram than all the other diagrams. The best solution is to keep it simple and adapt the modeling to the level of the team. **If no UML experience** then just create class diagram to represent the skeleton of your application. **If beginner** level then start with an usecase, sequence and class diagram. **If medium level** then use all the diagrams because each diagram cover another view which is not always possible to code with Java. I mean that java is only related to class and sequence diagram.
4,843,126
I have some software which makes a request to a specific URL in internet and I want it to receive my custom response. Is there any software tool for that on Windows? Also it would be nice if I could map a regexp instead of specific URL
2011/01/30
[ "https://Stackoverflow.com/questions/4843126", "https://Stackoverflow.com", "https://Stackoverflow.com/users/485115/" ]
Found the solution myself: 1. Set the domain of the URL to point to 127.0.0.1 in windows hosts file 2. Install nginx and set it up to show your file for the request response to which you're willing to modify and proxy all other requests to the original server
You could consider writing a test and mocking out the http response with your custom response. I could give an example using C# and rhino mocks but it's not clear which platform you are working with.
4,843,126
I have some software which makes a request to a specific URL in internet and I want it to receive my custom response. Is there any software tool for that on Windows? Also it would be nice if I could map a regexp instead of specific URL
2011/01/30
[ "https://Stackoverflow.com/questions/4843126", "https://Stackoverflow.com", "https://Stackoverflow.com/users/485115/" ]
Found the solution myself: 1. Set the domain of the URL to point to 127.0.0.1 in windows hosts file 2. Install nginx and set it up to show your file for the request response to which you're willing to modify and proxy all other requests to the original server
You can: * Try to enject your dll into the process and replace functions like (HttpSendRequest, HttpQueryInfo,...) with your oun versions. * Try to use something like WinPCap (http://www.winpcap.org/).
4,843,126
I have some software which makes a request to a specific URL in internet and I want it to receive my custom response. Is there any software tool for that on Windows? Also it would be nice if I could map a regexp instead of specific URL
2011/01/30
[ "https://Stackoverflow.com/questions/4843126", "https://Stackoverflow.com", "https://Stackoverflow.com/users/485115/" ]
Found the solution myself: 1. Set the domain of the URL to point to 127.0.0.1 in windows hosts file 2. Install nginx and set it up to show your file for the request response to which you're willing to modify and proxy all other requests to the original server
Fiddler (www.fiddler2.com) has an AutoResponder feature which does exactly that.
264,727
According to Wikipedia the definition of motion is: > > In physics, motion is a change in position of an object with respect to time. Motion is typically described in terms of displacement, distance, velocity, acceleration, time and speed. > > > The definition of uniform motion is that the object is supposed to cover equal distances in equal intervals of time. This means that the object in motion will have constant velocity. But when we are talking about uniform motion, why is it defined only in the terms of velocity and not acceleration or displacement?
2016/06/26
[ "https://physics.stackexchange.com/questions/264727", "https://physics.stackexchange.com", "https://physics.stackexchange.com/users/103630/" ]
> > The definition of uniform motion is that the object is supposed to cover equal distances in equal intervals of time. > > > Well, it *isn't* defined from velocity. As you clearly write it here yourself. That is your own interpretation. You could just as well have said that "*that means that the **acceleration** must be constant, so why do they define it from acceleration and not velocity?*" *Uniform motion* means all those things: Constant velocity, constant acceleration, constant displacements during each time interval etc.
In uniform velocity, changes occur uniformly is the cause of acceleration but in constant velocity no changes occur, then the acceleration is zero.
112,535
There is a Blues Standard "Nine Below Zero" and I wonder what the phrase means. The chorus is > > Nine Below Zero, she put me down for another > > > And it would also be super interesting where this phrase comes from!
2013/04/26
[ "https://english.stackexchange.com/questions/112535", "https://english.stackexchange.com", "https://english.stackexchange.com/users/-1/" ]
As multiple comments mentioned, this is making a play on words with the word "cold". In English if you use the phrase "*X* below zero", it is understood that you are talking about the temperature. (To speak of temperatures warmer than 0, you instead phrase it as "X degrees". So >0 you say "degrees", <0 you say "below zero"). In the USA (home of the blues), the Farenheit scale is used. The freezing point of water is at 32 degrees. So any time you actually go into negative numbers on the F scale, it is really really cold. (If you are more familar with Celcius, -9F would be about -23C) Note that the song's author, [Sonny Boy Williamson](http://en.wikipedia.org/wiki/Sonny_Boy_Williamson_II), was from Mississippi, where it rarely drops below freezing (32F), so this would be a temperature colder than anything he likely personally ever experienced. In short, the number is meant to sound extreme. One of the other meanings of "cold" is someone who is uncaring. So basically this song is saying that she isn't simply being uncaring, but really really uncaring.
Well, in my opinion, *nine below zero* doesn't go about temperature, but cash. If you get the lyrics as a whole, it's all about money. The guy is gave the girl all of his money and now that he's broke she left him for another man. If we consider the nine word sound, it resembles to "nah", meaning no. "Nah below zero", as it would mean: "not in this world, pal".
400,014
There doesn't seem to be an English word describing the ability to tell truth from a lie. I've Googled, and posted on my FB account, but can't seem to find a word that precisely describes this ability. * Discernment. M-W defines this as "able to see and understand people things, or situations clearly and intelligently." Best so far, but a bit off the mark. It does not precisely identify the ability to perceive and separate truth from falsehoods. * The antonym of gullible * A discerning ear * (Slang) anti-bs meter; able to discern bullsh!t. Others have suggested guarded, prudent, realistic, astute, and perceptive... but none of these precisely describe the quality that I've described. The word should fit 'XXXXXXX' in the following: > > John is so gullible; he'll believe anything. Not so Jane, she is XXXXXXX. She has quite the discerning ear; you'll never be able to deceive her with a lie. > > > Here are some possibles (consulted thesaurus.com; listed antonyms for `gullible`; definitions from Google.) * discerning. Having or showing good judgment. Discussed above; best so far, but a bit off the mark. * astute. Having or showing an ability to accurately assess situations or people and turn this to one's advantage. Rejected because does not account for lies. * knowledgeable. intelligent and well informed. Does not speak to distinguishing truth from lies. * perceptive. Having or showing sensitive insight. Does not speak to discernment of truth or lies. * suspicious. Having or showing a cautious distrust of someone or something.. Speaks more to distrust than separation of truth from lies. * unbelieving. Not believing someone or something. Does not speak to the ability to distinguish truth from lies.
2017/07/14
[ "https://english.stackexchange.com/questions/400014", "https://english.stackexchange.com", "https://english.stackexchange.com/users/213996/" ]
How about the word wisdom? Def: The ability to discern what is true, right, etc. if you can discern truth then you automatically negate lies. The use of the word discern in the definition also, in my opinion, doesn't pose a problem since it is defined as follows: **if you discern something, you are aware of it and know it. ie the truth** Collins dictionary.
I might suggest the word **Sagacious** Sagacious combines some elements of "wise to the world" with the concept of a sharp and well considered use of intellect, as I understand the word > > [**Sagacious** at Dictionary.com](http://www.dictionary.com/browse/sagacious) adjective > > > 1. > having or showing acute mental discernment and keen practical sense; shrewd: > > > *a sagacious lawyer.* > > >
400,014
There doesn't seem to be an English word describing the ability to tell truth from a lie. I've Googled, and posted on my FB account, but can't seem to find a word that precisely describes this ability. * Discernment. M-W defines this as "able to see and understand people things, or situations clearly and intelligently." Best so far, but a bit off the mark. It does not precisely identify the ability to perceive and separate truth from falsehoods. * The antonym of gullible * A discerning ear * (Slang) anti-bs meter; able to discern bullsh!t. Others have suggested guarded, prudent, realistic, astute, and perceptive... but none of these precisely describe the quality that I've described. The word should fit 'XXXXXXX' in the following: > > John is so gullible; he'll believe anything. Not so Jane, she is XXXXXXX. She has quite the discerning ear; you'll never be able to deceive her with a lie. > > > Here are some possibles (consulted thesaurus.com; listed antonyms for `gullible`; definitions from Google.) * discerning. Having or showing good judgment. Discussed above; best so far, but a bit off the mark. * astute. Having or showing an ability to accurately assess situations or people and turn this to one's advantage. Rejected because does not account for lies. * knowledgeable. intelligent and well informed. Does not speak to distinguishing truth from lies. * perceptive. Having or showing sensitive insight. Does not speak to discernment of truth or lies. * suspicious. Having or showing a cautious distrust of someone or something.. Speaks more to distrust than separation of truth from lies. * unbelieving. Not believing someone or something. Does not speak to the ability to distinguish truth from lies.
2017/07/14
[ "https://english.stackexchange.com/questions/400014", "https://english.stackexchange.com", "https://english.stackexchange.com/users/213996/" ]
How about the word wisdom? Def: The ability to discern what is true, right, etc. if you can discern truth then you automatically negate lies. The use of the word discern in the definition also, in my opinion, doesn't pose a problem since it is defined as follows: **if you discern something, you are aware of it and know it. ie the truth** Collins dictionary.
> > There doesn't seem to be an English word describing the ability to tell truth from a lie. > > > That is because English is an excellent language that realises that the ability to tell truth from a lie 100% of the time does not exist. As a consequence, any antonym for gullible, which does **not** mean "always accepts a lie as the truth" is not going to encompass this idea of infallibility. The nearest you will get is a reasonable approximation: OED **streetwise,** adj. **Of a person: that has the skills and knowledge necessary for dealing with modern urban life; smart; tough. Of a thing: suitable for or reflective of modern urban life.** 1949 P. W. Tappan Juvenile Delinquency xix. 538 *She was streetwise enough not to get involved in the same area twice.* **Canny** **c. Cautious and careful in worldly or business matters; worldly-wise, shrewd.** 1987 P. Wright & P. Greengrass Spycatcher vi. 73 *In fact, the intelligence gathered was worthless. Khrushchev was far too canny a bird to discuss anything of value in a hotel room.* **astute**, adj. **Of keen penetration or discernment, esp. in regard to one's own interests; shrewd, subtle, sagacious; wily, cunning, crafty.** 1878 R. B. Smith Carthage 331 *He had, with the astute fickleness of a barbarian, come to a secret understanding with Scipio.* You will note that within the above definitions there are other close synonyms that you may find useful.
18,594
Most people in my workplace have multiple monitors with the primary monitor being to the left of the secondary one, and I have noticed that they have trouble closing applications. Generally, the problem arises when they aim for the infinite top-right corner of their primary monitor (the standard location for the "close" button) and their cursor slides across to the second monitor. They also tend to have trouble with items near the right edge of the primary monitor. I always like to offset my secondary monitor so I can hit the top right corner (at the expense of the bottom right), but I have trouble convincing other people to do this. Are there any UX guidelines for application interfaces in multi-monitor environments? And should any such guidelines account for different monitor positions? (e.g. secondary monitor to the right, secondary monitor above) **Update:** I'm not so much after OS-specific tips for improving the Multi-monitor experience, as I don't have control over the user's OS behaviour (i.e. I can't force my co-workers to offset their screens). I am seeking guidelines for interface development that take account of the altered properties of multi-monitor setup (for example, how to account for the effective loss of a screen edge).
2012/03/13
[ "https://ux.stackexchange.com/questions/18594", "https://ux.stackexchange.com", "https://ux.stackexchange.com/users/11432/" ]
**psychology** the right side is perceived as rational, while left as more emotional/creative and sensitive. **interaction** you describe ideal model according to the Fitt's law at which the value of interaction aspires to infinity (an interaction element at single monitor corner). [Fitt's Law](http://en.wikipedia.org/wiki/Fitts%27s_law) [Fitt's Law demonstration](http://fww.few.vu.nl/hci/interactive/fitts/) **ux**. I use for a long time two monitors for work, as primary the right is established. Primary apps are started on the right screen, left is used generally for the auxiliary purposes (file manager, email, music player etc). Similar practice was noticed and co-workers from other departments or during carrying out tests in eye tracking lab. Only 65 % of lefthanders have a left screen as main. If to choose from two monitors - at least by two criteria the right screen as primary it is most convenient, as show supervision.
Having monitors set up in a vertical layout (one above the other) could strain the neck. I think that the ideal (from an ergonomic point of view) is to have the monitors at the same height and distance from you and to rotate with the chair + mouse and keyboard towards the monitor you are currently using, so that you are facing it almost directly with you entire body and no sitting in an offset. **These two tips could help preventing the "loss" of the cursor:** 1. In order to not "loose" the cursor when working with two screens I use the flash on Ctrl click OS-feature, so that **the cursor attracts attention** even **from the corner of my eye**. 2. In the office I use two (almost) identical monitors both at the same height and at angle (so there is approximately a 120 degree angle between them) and sit between them, that way I am not biased towards either. Since this layout means you are never directry facing either monitor, but instead facing about 2/3 of its width - towards the other monitor, **you always have view of the edge of the second monitor**, especially when looking at the edge of the screen, so you don't loose the cursor. As of how I divide my work between the screens... I have the taskbar + open primary applications on one (the left) and the desktop icons + mail, browsers and additional instance of primary application on the other (the right). When I am working with one more than the other, I turn my chair, keyboard and mouse a bit, so that I don't tilt my body much. I found that working with two differently sized monitors is uncomfortable for me and I end up just using the larger one. At home I have one big screen and if I have multiple apps open at once, I put one on the right and one on the left e.g. movies on the right and documents/browsers on the left.
18,594
Most people in my workplace have multiple monitors with the primary monitor being to the left of the secondary one, and I have noticed that they have trouble closing applications. Generally, the problem arises when they aim for the infinite top-right corner of their primary monitor (the standard location for the "close" button) and their cursor slides across to the second monitor. They also tend to have trouble with items near the right edge of the primary monitor. I always like to offset my secondary monitor so I can hit the top right corner (at the expense of the bottom right), but I have trouble convincing other people to do this. Are there any UX guidelines for application interfaces in multi-monitor environments? And should any such guidelines account for different monitor positions? (e.g. secondary monitor to the right, secondary monitor above) **Update:** I'm not so much after OS-specific tips for improving the Multi-monitor experience, as I don't have control over the user's OS behaviour (i.e. I can't force my co-workers to offset their screens). I am seeking guidelines for interface development that take account of the altered properties of multi-monitor setup (for example, how to account for the effective loss of a screen edge).
2012/03/13
[ "https://ux.stackexchange.com/questions/18594", "https://ux.stackexchange.com", "https://ux.stackexchange.com/users/11432/" ]
**psychology** the right side is perceived as rational, while left as more emotional/creative and sensitive. **interaction** you describe ideal model according to the Fitt's law at which the value of interaction aspires to infinity (an interaction element at single monitor corner). [Fitt's Law](http://en.wikipedia.org/wiki/Fitts%27s_law) [Fitt's Law demonstration](http://fww.few.vu.nl/hci/interactive/fitts/) **ux**. I use for a long time two monitors for work, as primary the right is established. Primary apps are started on the right screen, left is used generally for the auxiliary purposes (file manager, email, music player etc). Similar practice was noticed and co-workers from other departments or during carrying out tests in eye tracking lab. Only 65 % of lefthanders have a left screen as main. If to choose from two monitors - at least by two criteria the right screen as primary it is most convenient, as show supervision.
If you or your coworkers are on Windows, there is a simple workaround: Click on the active window (the target is much larger than an "X" icon), and then: CTRL+W or ALT+F4 to close For multiple monitors, there are also several handy shortcuts: WINDOWS+LEFT OR WINDOWS+RIGHT to attach window to left/right hand side of the screen WINDOWS+D to show desktop; once again to show all Try also WINDOWS+UP and WINDOWS+DOWN Have fun.
20,380
It's been a while since I've dealt with optical imagery. I need to perform a land cover classification at mid-latitudes using several LANDSAT scenes. I've noticed that some online tools are still selling the imagery, but I was under the impression that the archive was now offered up at no cost. What is the best/easiest way to obtain temporal Landsat imagery?
2012/02/15
[ "https://gis.stackexchange.com/questions/20380", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/2114/" ]
**Bulk Download** One can also follow the instructions given at [Landsat Scenes: Bulk Download](https://earthexplorer.usgs.gov/order/bulkdownload), part of USGS' [EarthExplorer](https://earthexplorer.usgs.gov) web-service. After selecting the scenes of interest within from either the [USGS Global Visualisation Viewer](http://glovis.usgs.gov/) or [EarthExplorer](http://earthexplorer.usgs.gov/), one has to save/create the scene IDs of interest as a list (each ID entry should be a single line) in a pure *.txt* file. More about this USGS' respective Q&A (FAQ): [How do I submit a bulk download request for Landsat data?](http://landsat.usgs.gov/bulk_download_request.php) It only takes then to upload the *.txt* file in the above mentioned page (web-service) and get as a result down-loadable scenes (links) or submit a Bulk Download order which can be completed by using the [Bulk Download Application](http://earthexplorer.usgs.gov/bulk/) (see the [Help Documentation](https://lta.cr.usgs.gov/sites/default/files/Final1282015bdahelp.pdf)). **Notes** * the [GLCF](http://glcf.umiacs.umd.edu/) maintains a small subset of the entire Landsat archive, prior to 2006 * **[update]** there is, however, ~~(currently?)~~ a **restriction** in downloading **up to ~~100~~ 500 Landsat scenes** per *Bulk Download Order*
The USGS have been recommending using [EarthExplorer](http://earthexplorer.usgs.gov/) (EE) because it has the most development resources right now. They offer the **USGS Inventory Service** as a machine-to-machine SOAP API for communicating with EE for querying their archive for scenes. This way, you can also order scenes for processing to Level 1 georegistered radiance products, and also get the weblink to download them. A Python tool is being developed here [LANDSAT-Download](https://github.com/olivierhagolle/LANDSAT-Download) where you can provide the Python script a list of WRS-2 target sites, and it will download all the available products `.tar.gz` for the year
20,380
It's been a while since I've dealt with optical imagery. I need to perform a land cover classification at mid-latitudes using several LANDSAT scenes. I've noticed that some online tools are still selling the imagery, but I was under the impression that the archive was now offered up at no cost. What is the best/easiest way to obtain temporal Landsat imagery?
2012/02/15
[ "https://gis.stackexchange.com/questions/20380", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/2114/" ]
USGS is what I use. Note that high quality processing can be achieved in GRASS, I encourage you to carry out atmospheric correction. There are a lot of "primers" out there about calculating NDVI etc which completely overlook atmospheric effects. You can achieve quantitative analysis this way.
AWS hosts Landsat scenes on S3 <https://aws.amazon.com/public-data-sets/landsat/> To do land cover classification, you could also consider using Sentinel 2 data. Sentinel 2A has been launched a few months ago, its 10m resolution with 13 spectral bands. The Copernicus program grants full open access to the sentinel data: <https://scihub.copernicus.eu/> Here is an explorer for finding sentinel data <http://satcat.eoproc.com/cat-01/dev-online.html?&config=demo-01>
20,380
It's been a while since I've dealt with optical imagery. I need to perform a land cover classification at mid-latitudes using several LANDSAT scenes. I've noticed that some online tools are still selling the imagery, but I was under the impression that the archive was now offered up at no cost. What is the best/easiest way to obtain temporal Landsat imagery?
2012/02/15
[ "https://gis.stackexchange.com/questions/20380", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/2114/" ]
You can also get it from the [Global Land Cover Facility](http://glcfapp.glcf.umd.edu:8080/esdi/index.jsp). No registration required. ![enter image description here](https://i.stack.imgur.com/j1NI1.jpg)
AWS hosts Landsat scenes on S3 <https://aws.amazon.com/public-data-sets/landsat/> To do land cover classification, you could also consider using Sentinel 2 data. Sentinel 2A has been launched a few months ago, its 10m resolution with 13 spectral bands. The Copernicus program grants full open access to the sentinel data: <https://scihub.copernicus.eu/> Here is an explorer for finding sentinel data <http://satcat.eoproc.com/cat-01/dev-online.html?&config=demo-01>
20,380
It's been a while since I've dealt with optical imagery. I need to perform a land cover classification at mid-latitudes using several LANDSAT scenes. I've noticed that some online tools are still selling the imagery, but I was under the impression that the archive was now offered up at no cost. What is the best/easiest way to obtain temporal Landsat imagery?
2012/02/15
[ "https://gis.stackexchange.com/questions/20380", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/2114/" ]
**Bulk Download** One can also follow the instructions given at [Landsat Scenes: Bulk Download](https://earthexplorer.usgs.gov/order/bulkdownload), part of USGS' [EarthExplorer](https://earthexplorer.usgs.gov) web-service. After selecting the scenes of interest within from either the [USGS Global Visualisation Viewer](http://glovis.usgs.gov/) or [EarthExplorer](http://earthexplorer.usgs.gov/), one has to save/create the scene IDs of interest as a list (each ID entry should be a single line) in a pure *.txt* file. More about this USGS' respective Q&A (FAQ): [How do I submit a bulk download request for Landsat data?](http://landsat.usgs.gov/bulk_download_request.php) It only takes then to upload the *.txt* file in the above mentioned page (web-service) and get as a result down-loadable scenes (links) or submit a Bulk Download order which can be completed by using the [Bulk Download Application](http://earthexplorer.usgs.gov/bulk/) (see the [Help Documentation](https://lta.cr.usgs.gov/sites/default/files/Final1282015bdahelp.pdf)). **Notes** * the [GLCF](http://glcf.umiacs.umd.edu/) maintains a small subset of the entire Landsat archive, prior to 2006 * **[update]** there is, however, ~~(currently?)~~ a **restriction** in downloading **up to ~~100~~ 500 Landsat scenes** per *Bulk Download Order*
Check out [USGS' EarthExplorer](http://earthexplorer.usgs.gov/), most are free including all of LANDSAT's archive. You need to register to download data.
20,380
It's been a while since I've dealt with optical imagery. I need to perform a land cover classification at mid-latitudes using several LANDSAT scenes. I've noticed that some online tools are still selling the imagery, but I was under the impression that the archive was now offered up at no cost. What is the best/easiest way to obtain temporal Landsat imagery?
2012/02/15
[ "https://gis.stackexchange.com/questions/20380", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/2114/" ]
I am in Canada so if I need this imagery I can get it free at [Geobase.](http://www.geobase.ca/geobase/en/index.html) Elsewhere you should be able to download from [USGS](http://landsat.usgs.gov/Landsat_Search_and_Download.php) direct. You will need to register on both sites. Here are [NASA](http://landsat.gsfc.nasa.gov/data/where.html) links to download free Landsat data.
For Landsat 8 imagery, I've found the [landsat-util](https://github.com/developmentseed/landsat-util) tool to be the easiest to use.
20,380
It's been a while since I've dealt with optical imagery. I need to perform a land cover classification at mid-latitudes using several LANDSAT scenes. I've noticed that some online tools are still selling the imagery, but I was under the impression that the archive was now offered up at no cost. What is the best/easiest way to obtain temporal Landsat imagery?
2012/02/15
[ "https://gis.stackexchange.com/questions/20380", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/2114/" ]
You can also get it from the [Global Land Cover Facility](http://glcfapp.glcf.umd.edu:8080/esdi/index.jsp). No registration required. ![enter image description here](https://i.stack.imgur.com/j1NI1.jpg)
The USGS have been recommending using [EarthExplorer](http://earthexplorer.usgs.gov/) (EE) because it has the most development resources right now. They offer the **USGS Inventory Service** as a machine-to-machine SOAP API for communicating with EE for querying their archive for scenes. This way, you can also order scenes for processing to Level 1 georegistered radiance products, and also get the weblink to download them. A Python tool is being developed here [LANDSAT-Download](https://github.com/olivierhagolle/LANDSAT-Download) where you can provide the Python script a list of WRS-2 target sites, and it will download all the available products `.tar.gz` for the year
20,380
It's been a while since I've dealt with optical imagery. I need to perform a land cover classification at mid-latitudes using several LANDSAT scenes. I've noticed that some online tools are still selling the imagery, but I was under the impression that the archive was now offered up at no cost. What is the best/easiest way to obtain temporal Landsat imagery?
2012/02/15
[ "https://gis.stackexchange.com/questions/20380", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/2114/" ]
I am in Canada so if I need this imagery I can get it free at [Geobase.](http://www.geobase.ca/geobase/en/index.html) Elsewhere you should be able to download from [USGS](http://landsat.usgs.gov/Landsat_Search_and_Download.php) direct. You will need to register on both sites. Here are [NASA](http://landsat.gsfc.nasa.gov/data/where.html) links to download free Landsat data.
Check out [USGS' EarthExplorer](http://earthexplorer.usgs.gov/), most are free including all of LANDSAT's archive. You need to register to download data.
20,380
It's been a while since I've dealt with optical imagery. I need to perform a land cover classification at mid-latitudes using several LANDSAT scenes. I've noticed that some online tools are still selling the imagery, but I was under the impression that the archive was now offered up at no cost. What is the best/easiest way to obtain temporal Landsat imagery?
2012/02/15
[ "https://gis.stackexchange.com/questions/20380", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/2114/" ]
The USGS have been recommending using [EarthExplorer](http://earthexplorer.usgs.gov/) (EE) because it has the most development resources right now. They offer the **USGS Inventory Service** as a machine-to-machine SOAP API for communicating with EE for querying their archive for scenes. This way, you can also order scenes for processing to Level 1 georegistered radiance products, and also get the weblink to download them. A Python tool is being developed here [LANDSAT-Download](https://github.com/olivierhagolle/LANDSAT-Download) where you can provide the Python script a list of WRS-2 target sites, and it will download all the available products `.tar.gz` for the year
AWS hosts Landsat scenes on S3 <https://aws.amazon.com/public-data-sets/landsat/> To do land cover classification, you could also consider using Sentinel 2 data. Sentinel 2A has been launched a few months ago, its 10m resolution with 13 spectral bands. The Copernicus program grants full open access to the sentinel data: <https://scihub.copernicus.eu/> Here is an explorer for finding sentinel data <http://satcat.eoproc.com/cat-01/dev-online.html?&config=demo-01>
20,380
It's been a while since I've dealt with optical imagery. I need to perform a land cover classification at mid-latitudes using several LANDSAT scenes. I've noticed that some online tools are still selling the imagery, but I was under the impression that the archive was now offered up at no cost. What is the best/easiest way to obtain temporal Landsat imagery?
2012/02/15
[ "https://gis.stackexchange.com/questions/20380", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/2114/" ]
USGS is what I use. Note that high quality processing can be achieved in GRASS, I encourage you to carry out atmospheric correction. There are a lot of "primers" out there about calculating NDVI etc which completely overlook atmospheric effects. You can achieve quantitative analysis this way.
For Landsat 8 imagery, I've found the [landsat-util](https://github.com/developmentseed/landsat-util) tool to be the easiest to use.
20,380
It's been a while since I've dealt with optical imagery. I need to perform a land cover classification at mid-latitudes using several LANDSAT scenes. I've noticed that some online tools are still selling the imagery, but I was under the impression that the archive was now offered up at no cost. What is the best/easiest way to obtain temporal Landsat imagery?
2012/02/15
[ "https://gis.stackexchange.com/questions/20380", "https://gis.stackexchange.com", "https://gis.stackexchange.com/users/2114/" ]
Check out [USGS' EarthExplorer](http://earthexplorer.usgs.gov/), most are free including all of LANDSAT's archive. You need to register to download data.
AWS hosts Landsat scenes on S3 <https://aws.amazon.com/public-data-sets/landsat/> To do land cover classification, you could also consider using Sentinel 2 data. Sentinel 2A has been launched a few months ago, its 10m resolution with 13 spectral bands. The Copernicus program grants full open access to the sentinel data: <https://scihub.copernicus.eu/> Here is an explorer for finding sentinel data <http://satcat.eoproc.com/cat-01/dev-online.html?&config=demo-01>
1,123,603
I have a version 3.30.0-1 of the Gnome Calendar. I would like to try some other calendar application and therefore I would like to export a calendar to ics file of something appropriate that could be imported in that other application. Is there a way to export a calendar? Or is there some other way to solve this task?
2019/03/06
[ "https://askubuntu.com/questions/1123603", "https://askubuntu.com", "https://askubuntu.com/users/564105/" ]
I have recenty migrated to Ubuntu and as part of the migration process I have done lots of research including looking into calendar apps for Ubuntu and I found that the Gnome Calendar currently does not support exporting calendars, incidentally I found this feature has been requested and consequently filed as a bug/feature request at gitlab a year ago, however it has not entered into the design stages yet, so doesnt look like it will happen anytime soon, you can see the request at: <https://gitlab.gnome.org/GNOME/gnome-calendar/issues/31> Having said that, although you currently cannot export Gnome Calendars or events you can however sync with online calendars as shown below: [Sync Gnome Calendar in Calendar Settings with other Online Account Calendars](https://i.stack.imgur.com/FVSAU.png) The following blog demonstrates how this is done: <https://www.ctrl.blog/entry/gnome-caldav> There is also a list of alternatives to GNOME Calendar you may find useful at: <https://alternativeto.net/software/gnome-calendar/> I personally am going to use the Lightning Calendar as it can be integrated into thunderbird and you can synchronize Thunderbird Calendar (Events & Tasks) with Gnome-Shell Built-in Calendar via Evolution or other online Calendars like Google Calendar, Lightning also allows you to export Calendars or Events to HTML, iCalendar or CSV formats. The following link shows you how you can sync lightning with Google Calendar: <https://support.mozilla.org/en-US/kb/using-lightning-google-calendar> I just read the other posts and from what Owain said, I could find no Save As option in Gnome calendar to Export the ics file. however, if you look at the paths to the calendar.ics file(s), it appears that Gnome Calendar is in fact evolution under the hood and psw1747 is also right except for the path or at least it seems that way on my system, because I found 3 calendar.ics files, that were there from install, so I thought there must be one ics file for each calendar, which on my system are: -Birthdays & Anniversaries -My Calendar -Personal and so I added an event to all 3 calendars to determine which file corresponds to which calendar and found that unless something went wrong with the install, all events from all calendars are written only to the one ics file is stored in: /home/me/.local/share/evolution/calendar/9xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx1 the other ics files were left untouched including the one in the location that psw1747 posted: /home/me/.local/share/evolution/calendar/system /home/me/.local/share/evolution/calendar/trash/9bxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxf2 **FINAL ANSWER** In any case it shows that all 3 posts have contributed to the final answer which is that Gnome Calendar is in fact evolution under the hood (Owain) and is stored as an ICS file as psw1747 pointed out , so this explains why there are no import/export calendar options required in the UI, since to import you just need to replace the ICS file you want to import and to export you just locate the ics file import it into your target calendar. The only problem I can envisage is where you want to import a calendar, but want to preserve the events in your Gnome calendar so you would really need to find a way to merge the two calendars together.
If this is the same as Gnome Evolution Mail and Calendar, "To export a complete calendar, right-click on the calendar in the list of calendars and click Save as. Available formats are iCalendar format (ICS, recommended), comma separated values (CSV), and RDF format. If you want to export only one appointment (or task or memo), either select the appointment and select File ▸ Save as iCalendar…, or right-click on the appointment and click Save as iCalendar…." <https://help.gnome.org/users/evolution/stable/exporting-data-calendar.html.en>
180,058
I made a homebrew creature that's supposed to be impossible for them to fight at the moment as that creature is the BBEG. I wanted to show the strength gap between the pcs start and how strong they will have gotten at the end, but I doubt that they will back away from fighting the creature. How do I introduce my BBEG's power without my pcs rushing in to fight them?
2021/01/27
[ "https://rpg.stackexchange.com/questions/180058", "https://rpg.stackexchange.com", "https://rpg.stackexchange.com/users/68166/" ]
There are lots of options here: * Have the creature kill something in front of them. Preferably something they know is tough. And don't do it cinematically, roll dice, so they know the power is real. Don't play out an entire encounter in front of them. Just show that it can kill that knight with 18 AC and 50 HP in one turn. Just after the PCs spend 3 rounds trying to kill him, all together. (If you use a screen, it doesn't really matter what you roll, just let that creature die fast) * Similar to the first, have a useful, but unlikeable person follow the PCs for a fight or two. Give one of the players control of him. He is 1 level above the players. Later when they are split off from him, they see the creature slaughter him. If he is too likeable the players might decide to try and recover the body for resurrection, so be careful with that. Again, roll the actual dice. * Have a powerful patron of the party warn them about the creature earlier. * Have a clear path to escape. This one is not enough on its' own. But if they players don't think they can run, they might try to fight. * Let them attack with a group of people, let the group be slaughtered around them. Include in the group someone who has the means to let the party escape. Preferably you have set this up beforehand, like a paranoid wizard who always have a scroll of teleportation. (If he just pulls it out mid-combat, without fore-shadowing, it might feel like you are deus ex machina saving their butts, and future challenges will feel less dangerous) * If your players are experienced enough, have him or one of his henchmen cast a high level spell. If he is not a spellcaster himself. Have him murder someone, and then tell his minion to disintegrate the remains to prevent resurrection. (Nothing says power like having a minion throw around 6th level spells). This does require the PCs to have an idea how powerful the magic actually is though. * Sometimes there is a compelling reason to keep the PCs alive despite a loss. This really depends on your story, and your PCs, but perhaps one of them is from a rich family, and the BBEG captures them and ransoms them back to the family. Perhaps one of them is of a special birth that makes them a valuable hostage (until they perform their daring escape of course). * Foreshadowing. Try if you can avoid just dumping in the BBEG without any idea what he is. Rumors and stories about him. Depends on the nature of your BBEG, but think about who knows about him, who would warn about him. Who serves him? almost dying to his servant, then finding out the servant is just a small cog in the wheels of this giant machine where BBEG sits at the top.
Here are a few options: * See the BBEG through divination such as scrying so the players *can't* interfere. Also works if they're in a far off location and can see the chaos the creature sows. > > I've used this to give characters with spying and social networking skills a way to get useful and plot focused information. > > > * Introduce the BBEG in a setting where etiquette, personal codes, etc. are the problem. > > Notable mentions are court sessions in L5R or Sidhe realms of 7th Sea. A territory can have binding rules that are as soft or hard as you like and prevent characters from diving in. This can be as mundane as a formal ball and not wanting to lose royal favor, as metaphysical as Geas or losing a protective magic like being invisible, or as literal as a fight causing a cave in. > > > * If the creature is intelligent, allow them to bargain the players away for now. > > Bribery and being told of a bigger threat (for now) could deter the players. In a recent game, the players had to decide if the lord hosting their stay was lying about a curse on the land, and decided to take a simple task from him for his aid until they could learn more. > > > * If it's a "Good" party, they shouldn't be [murder hobos](https://rpg.stackexchange.com/questions/151143/what-exactly-is-a-murder-hobo) and won't just attack something for existing. > > The older I get, the more even my most warrior based tables try to avoid a fight. Naturally, once it's on they don't hold back, but it's useful that they want an actual reason to kill something. I've also posed a moral dilemma to a paladin about whether or not they should kill a hatchling black dragon. It's an evil creature, but it also hasn't committed any crimes yet. > > > * Put the initial encounter when the party is ragged from the rest of the dungeon/encounter/scene. No special abilities and low health should make them unlikely to attack something they don't know > > This is one I've done in war campaigns. The players are just at the end of a battle and they could take this foe on now, but they are simply out of gas and need to pull back if they don't want to whip out the big eraser. It created for a fun tug of war mechanic because they would take an area but have to return to a base camp to recover, which not only gave them glimpses to the next threat, but me time to plan it better. > > > * Competing interests are always valid. If the players have to bring the MacGuffin back unharmed, and the create is a cut scene in their path they'll keep walking. > > Part of the socially binding limits, collateral damage is always a factor. Sometimes the creature needs to be let go and continue its rampage because it takes it away from the town. I've also had a campaign where players were in house that was collapsing from being dilapidated. They were in there to recover a family heirloom, which was a painting, and thus easily damaged if they got into a fight. They also didn't want to risk a [TPK](https://tvtropes.org/pmwiki/pmwiki.php/Main/TotalPartyKill) by staying somewhere unstable. > > >
180,058
I made a homebrew creature that's supposed to be impossible for them to fight at the moment as that creature is the BBEG. I wanted to show the strength gap between the pcs start and how strong they will have gotten at the end, but I doubt that they will back away from fighting the creature. How do I introduce my BBEG's power without my pcs rushing in to fight them?
2021/01/27
[ "https://rpg.stackexchange.com/questions/180058", "https://rpg.stackexchange.com", "https://rpg.stackexchange.com/users/68166/" ]
There are lots of options here: * Have the creature kill something in front of them. Preferably something they know is tough. And don't do it cinematically, roll dice, so they know the power is real. Don't play out an entire encounter in front of them. Just show that it can kill that knight with 18 AC and 50 HP in one turn. Just after the PCs spend 3 rounds trying to kill him, all together. (If you use a screen, it doesn't really matter what you roll, just let that creature die fast) * Similar to the first, have a useful, but unlikeable person follow the PCs for a fight or two. Give one of the players control of him. He is 1 level above the players. Later when they are split off from him, they see the creature slaughter him. If he is too likeable the players might decide to try and recover the body for resurrection, so be careful with that. Again, roll the actual dice. * Have a powerful patron of the party warn them about the creature earlier. * Have a clear path to escape. This one is not enough on its' own. But if they players don't think they can run, they might try to fight. * Let them attack with a group of people, let the group be slaughtered around them. Include in the group someone who has the means to let the party escape. Preferably you have set this up beforehand, like a paranoid wizard who always have a scroll of teleportation. (If he just pulls it out mid-combat, without fore-shadowing, it might feel like you are deus ex machina saving their butts, and future challenges will feel less dangerous) * If your players are experienced enough, have him or one of his henchmen cast a high level spell. If he is not a spellcaster himself. Have him murder someone, and then tell his minion to disintegrate the remains to prevent resurrection. (Nothing says power like having a minion throw around 6th level spells). This does require the PCs to have an idea how powerful the magic actually is though. * Sometimes there is a compelling reason to keep the PCs alive despite a loss. This really depends on your story, and your PCs, but perhaps one of them is from a rich family, and the BBEG captures them and ransoms them back to the family. Perhaps one of them is of a special birth that makes them a valuable hostage (until they perform their daring escape of course). * Foreshadowing. Try if you can avoid just dumping in the BBEG without any idea what he is. Rumors and stories about him. Depends on the nature of your BBEG, but think about who knows about him, who would warn about him. Who serves him? almost dying to his servant, then finding out the servant is just a small cog in the wheels of this giant machine where BBEG sits at the top.
So you need to to give the party a demonstration of the BBEG's power, yet prevent them from immediately engaging it in combat? Show them the aftermath. ------------------------ It takes a little setup: * First, let them become familiar with a powerful NPC, someone already beyond their own capabilities. It could be an ally they've been working with (or under), some peacekeeper in an otherwise neutral zone, or even an enemy they can't get close to because their lieutenants (or even their minions) are enough trouble as it is. The key here is that the party would be completely outmatched against this NPC, **and they know it**. * Next, let your BBEG overcome said NPC, offscreen. (Overcoming will usually end up being killing, but I don't know your BBEG well enough to be sure.) * Finally, let your party come across what's left, some time after the BBEG has departed. Include a **lot** of environmental details related to the struggle. Be generous with them. Provide enough that anyone paying attention would have a fairly good idea of what had happened here and how. The exact nature of those details is going to be heavily dependent on who/what your BBEG and sacrificial NPC are, and the nature of the conflict itself. This tactic has its roots in the horror genre, where the intent is to hide the BBEG completely from sight (which also removes it as a target), although more modern takes on it do something like putting the BBEG behind unbreakable glass with a victim and letting you helplessly watch the carnage. Two examples from my games: * The party responds to an elven ranger (the new PC) bringing news of catastrophe at her master's grove. The party goes and meets with said master, who happens to be a high level druid, whose grove has been pushed back to maybe thirty square feet and whose students have gone in number from fifteen to two (the PC and one other student). The druid was occupied by protecting what little of his grove was left, but was able to give some details on who attacked and just how scared he was that it would all be destroyed. * The party invades a kobold warren, coming across a passage through which they can't move, but can hear the leader on the other side, confiding in a subordinate that she's nervous about the next demand 'the queen' will make. They found out elsewhere that 'the queen' was an undead black dragon, and promptly got pretty paranoid about everything having the dragon behind it.
38,985
I sent out a mass mailing via CiviMail and the reply-to email is default+r{seemingingly\_random\_string}@gmail.com I am using Sparkpost to send these mailings. CiviCRM 5.29.1 Any idea why the reply-to email is this odd-looking email and not the same as the From address?
2021/03/02
[ "https://civicrm.stackexchange.com/questions/38985", "https://civicrm.stackexchange.com", "https://civicrm.stackexchange.com/users/7672/" ]
I would just add all the contacts to a group (you have to create the group first) and then add the activity to all the contacts in the group.
As a workaround you could export as csv and then adjust the csv and then use it as input for Import Activities.
21,627,647
two tables : person and addresses ; join condition is addresses.key\_value = person.person\_id. there are three addresses.address\_type : 'R','M','T'. fetch person.first\_name, addresses.address\_1, addresses.zip, addresses.state if address\_type 'T' then fetch the address of 'T' else if 'M' else 'R'. for each address there is unique address\_id in addresses table.
2014/02/07
[ "https://Stackoverflow.com/questions/21627647", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2886453/" ]
package java.io; why u put this line in WelcomeServlet.java.
You're mapping to 'WelcomeServlet' not 'ServletExample'. Try going to localhost:8080/WelcomeServlet EDIT: There shouldn't be a trailing slash, sorry!
21,627,647
two tables : person and addresses ; join condition is addresses.key\_value = person.person\_id. there are three addresses.address\_type : 'R','M','T'. fetch person.first\_name, addresses.address\_1, addresses.zip, addresses.state if address\_type 'T' then fetch the address of 'T' else if 'M' else 'R'. for each address there is unique address\_id in addresses table.
2014/02/07
[ "https://Stackoverflow.com/questions/21627647", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2886453/" ]
You're mapping to 'WelcomeServlet' not 'ServletExample'. Try going to localhost:8080/WelcomeServlet EDIT: There shouldn't be a trailing slash, sorry!
Make sure ur projrct name is ServletExample. localhost:8080/ServletExample/index.html
21,627,647
two tables : person and addresses ; join condition is addresses.key\_value = person.person\_id. there are three addresses.address\_type : 'R','M','T'. fetch person.first\_name, addresses.address\_1, addresses.zip, addresses.state if address\_type 'T' then fetch the address of 'T' else if 'M' else 'R'. for each address there is unique address\_id in addresses table.
2014/02/07
[ "https://Stackoverflow.com/questions/21627647", "https://Stackoverflow.com", "https://Stackoverflow.com/users/2886453/" ]
package java.io; why u put this line in WelcomeServlet.java.
Make sure ur projrct name is ServletExample. localhost:8080/ServletExample/index.html
6,069,410
My application needs to download on the first run 50mb of data to work (and optional 500mb data), I thought about renting a server to host my files.. But I just read that Google increased the app limit in the market to 4GB: Does that mean that you can host your data to the Android Market so that after your gets installed it downloads them from the Market? Or does that mean that the max size of the .apk is 4gb? Should I include my data with the .apk? what about if I update the app? does the user have to redownload everything again? Thanks.
2011/05/20
[ "https://Stackoverflow.com/questions/6069410", "https://Stackoverflow.com", "https://Stackoverflow.com/users/668082/" ]
I believe it's the apk file size that's been increased. However, I don't think it's a good idea to let your users download a 550+ MB apk file, as it'll take up a lot of internal storage and it's difficult to update when you have to download that massive file again. Instead, create a smaller apk file that downloads the optional 500 MB data to the memory card. That way you can easily update the application and it's the most flexible for you, too.
> > But I just read that Google increased the app limit in the market to 4GB > > > Not yet. This was one of the items cited as being available in June 2011. > > Does that mean that you can host your data to the Android Market so that after your gets installed it downloads them from the Market? > > > Presumably, but there are few details at this time. > > Or does that mean that the max size of the .apk is 4gb? Should I include my data with the .apk? what about if I update the app? does the user have to redownload everything again? > > > I recommend that you wait until this exists and is documented before worrying. You can watch the [Google I|O presentation](http://www.youtube.com/user/GoogleDevelopers#p/u/78/GxU8N21wfrM) where they announced this upcoming capability, to find out pretty much all we know on the subject.
572,885
I am working on wiring a 12 V, 2 A power supply to a DC linear actuator (both linked below), but I do not know what wire to use. Will 22 gauge wire work, or is there a different gauge or type to fit my use case? Thanks for any help. Also, here is the [wire I think will work](https://rads.stackoverflow.com/amzn/click/com/B07D3MVRMR). [Power supply](https://rads.stackoverflow.com/amzn/click/com/B0711SZCMQ). [Motor](https://rads.stackoverflow.com/amzn/click/com/B08H57PQTH).
2021/06/25
[ "https://electronics.stackexchange.com/questions/572885", "https://electronics.stackexchange.com", "https://electronics.stackexchange.com/users/288550/" ]
I'd go with this [https://www.amazon.com/InstallGear-Gauge-Speaker-Touch-Cable/dp/B06W73MBD3/ref=sr\_1\_8?dchild=1&keywords=speaker+wire&qid=1624652266&refinements=p\_85%3A2470955011&rnid=2470954011&rps=1&sr=8-8](https://rads.stackoverflow.com/amzn/click/com/B06W73MBD3) The motor is rated at 12V/3A so it's about a 4 Ohm load. 16 AWG wire has a resistance of about 13 mOhm/meter. If you have 2 meter long cables, that's a total of 4 meters or about 50 mOhm so you are only dropping 150 mV over the wires dissipating about 450mW in the process. 22AWG has about 4 times the resistance, so you add 200 mOhm, drop 600mV and dissipate 1.8W.
There are three things to consider when selecting a wire: frequency, current, and voltage. At higher frequencies the current will flow through the outside of the wire and not through the center. This means you have reason to use stranded wire over solid core and perhaps even a thicker wire than usual. Thankfully you are using DC so this is not critical, but keep this in mind for future projects. So use either solid core or stranded, whatever is easier for you (stranded is just easier to work with IMO). Current dictates how thick (the gauge) the wire needs to be. For that look up your current in a table to tell you what gauge wire you need. [![enter image description here](https://i.stack.imgur.com/To4ow.jpg)](https://i.stack.imgur.com/To4ow.jpg) Since you are dealing with a 2A device that means 18AWG wire is the absolute thinnest you can safely use. So no 22 AWG wire will not be sufficient. Also keep in mind thinner wire adds some resistance, especially as it heats up. So usually better to use a thicket gauge than you would need. 18AWG is your minimum and thats fine but if you can go down to 16 AWG or more I would certainly recommend it. It never hurts to calculate out the resistance just to see what is going on. So from our table if we pick the minimum thickness wire of 18AWG then the resistance is 0.13 Ohms per meter. Obviously at nearly 1/10th of an ohm that should not have any significant impact on driving your motor. Just keep in mind that the max current rating is basically only valid for reasonable length runs. As you can see if your trying anything unusual like running the wire for a kilometer then we might have a problem. But for normal run lengths just using the max current rating is more than sufficient as it isnt even close to a ohm worth of resistance. Now just as current determines the thickness of the wire voltage determines the thickness of the insulator needed. Too thin and you get electrical arcs. Since you are only operating at 12V it is low enough that pretty much any insulated wire (aside from enamel insulation) should be more than sufficient. Just keep in mind when you work with higher voltages you will need to pay attention to the rating on the insulation itself. Other thing i recommend, though not required, is to pick a wire with silicone insulation. They don't melt or shrink when you solder them so they are nice to work with. However they tend to cost a tad bit more so entirely optional.
63,447
I am looking for an application that saves all CTRL C history. Is there such a thing for Ubuntu, or Linux in general? I remember seeing on of these, but I don't quite remember the details.
2011/09/28
[ "https://askubuntu.com/questions/63447", "https://askubuntu.com", "https://askubuntu.com/users/19986/" ]
Parcellite version 1.1.4 supports unity. The ppa is here <https://launchpad.net/~rickyrockrat/+archive/parcellite-appindicator> and the latest code is here <http://parcellite.sourceforge.net/> There are two builds of parcellite - one with the appindicator dependency and one without. The ppa WITHOUT unity support is <https://launchpad.net/~rickyrockrat/+archive/parcellite>
You can check [Keepboard](http://sourceforge.net/projects/keepboard/). It is written in Java and thus works on most distros.
188,862
Why do people in Clash of Clans trophy push? It really has no point, and it has me confused why anyone would want to 'town hall snipe' in order to get to a higher league. Any insight?
2014/10/21
[ "https://gaming.stackexchange.com/questions/188862", "https://gaming.stackexchange.com", "https://gaming.stackexchange.com/users/76421/" ]
People in Clash of Clans trophy push for a few reasons: * Achieve a personal record by seeing how high they can get (solo or with a clan) * Earn a gem bonus when they reach Crystal, Master, and Champion * [Win bonus](http://clashofclans.wikia.com/wiki/Trophy_Leagues) can make it worth it on bases to town hall snipe: ![enter image description here](https://i.imgur.com/2HdZNlX.png)
In addition to the other answer, clans sometimes push all at once to make themselves look nice, and then try to recruit players.
46,042
I know the Resurrection spell brings something back to life, but what happens when casting it on a zombie? A zombie is already dead, but now undead—does it "die" and is brought back to life, or does nothing happen?
2014/08/14
[ "https://rpg.stackexchange.com/questions/46042", "https://rpg.stackexchange.com", "https://rpg.stackexchange.com/users/15420/" ]
If the zombie is still 'alive', then *resurrection* does nothing. However, if you 'kill' the zombie, then you can resurrect the corpse. From the description of the [*resurrection*](https://www.d20srd.org/srd/spells/resurrection.htm) spell: > > You can resurrect someone killed by a death effect or someone who has > been turned into an undead creature and then destroyed. You cannot > resurrect someone who has died of old age. Constructs, elementals, > outsiders, and undead creatures can’t be resurrected. > > > If a human is killed and raised as a zombie, the zombie is destroyed, and then the remaining corpse is resurrected, you have a human again. * Getting to -10 HP turns a person into a corpse. * Going to 0 HP turns an undead into a corpse. * *Resurrection* turns a corpse into a human. * *Animate dead* turns a corpse into a zombie. Nothing I know of directly turns a human into a zombie, or a zombie into a human, without them spending some time as a corpse. (Someone will no doubt point out some way with some nonsense from *Libris Mortis*.)
They wouldn't come back. ------------------------ A zombie is a creature, it is not 'a corpse' which is the specified target for Resurrection. True Resurrection would arguably work, since it doesn't require a corpse. In that case, what happened to the Zombie would be up to the GM. It might conceivably continue to exist, as the True Resurrection spell creates a new body for the soul. That said, if you have the zombie, just kill it. Then it is a corpse again, and a target for Resurrection.
46,042
I know the Resurrection spell brings something back to life, but what happens when casting it on a zombie? A zombie is already dead, but now undead—does it "die" and is brought back to life, or does nothing happen?
2014/08/14
[ "https://rpg.stackexchange.com/questions/46042", "https://rpg.stackexchange.com", "https://rpg.stackexchange.com/users/15420/" ]
If the zombie is still 'alive', then *resurrection* does nothing. However, if you 'kill' the zombie, then you can resurrect the corpse. From the description of the [*resurrection*](https://www.d20srd.org/srd/spells/resurrection.htm) spell: > > You can resurrect someone killed by a death effect or someone who has > been turned into an undead creature and then destroyed. You cannot > resurrect someone who has died of old age. Constructs, elementals, > outsiders, and undead creatures can’t be resurrected. > > > If a human is killed and raised as a zombie, the zombie is destroyed, and then the remaining corpse is resurrected, you have a human again. * Getting to -10 HP turns a person into a corpse. * Going to 0 HP turns an undead into a corpse. * *Resurrection* turns a corpse into a human. * *Animate dead* turns a corpse into a zombie. Nothing I know of directly turns a human into a zombie, or a zombie into a human, without them spending some time as a corpse. (Someone will no doubt point out some way with some nonsense from *Libris Mortis*.)
The Rules Are Contradictory =========================== The 7th-level Clr spell [*resurrection*](http://www.d20srd.org/srd/spells/resurrection.htm) [conj] (*PH* 272-3) and the 9th-level Clr spell [*true resurrection*](http://www.d20srd.org/srd/spells/trueResurrection.htm) [conj] (*PH* 296) say that > > You can [bring back from the dead] someone killed by a death effect or someone who has been turned into an undead creature **and then destroyed**. > > > (emphasis mine), but the spells inherit the entry *Target: Dead creature touched* from the 5th-level Clr spell [*raise dead*](http://www.d20srd.org/srd/spells/raiseDead.htm) [conj] (*PH* 268), which means that when the *Monster Manual* describes the type [undead](http://www.d20srd.org/srd/typesSubtypes.htm#undeadType), saying that > > *Resurrection* and *true resurrection* can affect undead creatures. These spells turn undead creatures back into the living creatures they were before becoming undead. (317) > > > it's saying an undead creature *can* be the target of spells that the spells say *can't* target an undead creature. The *Player's Handbook* is the final authority on spells, but the *Monster Manual* is the final authority on creatures. Thus it's best if the DM decides whether this is a spell issue or a creature issue and makes a house rule to resolve this contradiction accordingly. This rules quirk remains even in the updated 2013 printings of the *Player's Handbook* and *Monster Manual*.
46,042
I know the Resurrection spell brings something back to life, but what happens when casting it on a zombie? A zombie is already dead, but now undead—does it "die" and is brought back to life, or does nothing happen?
2014/08/14
[ "https://rpg.stackexchange.com/questions/46042", "https://rpg.stackexchange.com", "https://rpg.stackexchange.com/users/15420/" ]
If the zombie is still 'alive', then *resurrection* does nothing. However, if you 'kill' the zombie, then you can resurrect the corpse. From the description of the [*resurrection*](https://www.d20srd.org/srd/spells/resurrection.htm) spell: > > You can resurrect someone killed by a death effect or someone who has > been turned into an undead creature and then destroyed. You cannot > resurrect someone who has died of old age. Constructs, elementals, > outsiders, and undead creatures can’t be resurrected. > > > If a human is killed and raised as a zombie, the zombie is destroyed, and then the remaining corpse is resurrected, you have a human again. * Getting to -10 HP turns a person into a corpse. * Going to 0 HP turns an undead into a corpse. * *Resurrection* turns a corpse into a human. * *Animate dead* turns a corpse into a zombie. Nothing I know of directly turns a human into a zombie, or a zombie into a human, without them spending some time as a corpse. (Someone will no doubt point out some way with some nonsense from *Libris Mortis*.)
If the zombie used to be a resurrectable creature in life, it is resurrected as that creature. The relevant quote from the description of the undead type is: > > Not affected by *raise dead* and *reincarnate* spells or abilities. *Resurrection* and *true resurrection* can affect undead creatures. These spells turn undead creatures back into the living creatures they were before becoming undead. > > > The resurrection spell does not directly contradict this. What it does say is: > > You can resurrect someone killed by a death effect or someone who has been turned into an undead creature and then destroyed. [...] Constructs, elementals, outsiders, and undead creatures can’t be resurrected. > > > The first part tells you the original creature can be resurrected if they were turned into an undead and destroyed, unlike with *raise dead*. The latter tells you you can't re-reanimate destroyed undead. You could interpret it as saying you can't cast *resurrection* on undead, but then it would also be saying you can't cast it on "living" constructs, elementals or outsiders. That clearly isn't the purpose (target is a dead creature touched); instead, it's saying those creatures, once destroyed/killed cannot be returned back to "life". So an undead cannot be resurrected as an undead, but can be resurrected as the original creature (where available) whether it is first destroyed (the spell description) or not (the type description). In practice, with 10 minute casting time, you are not going to be using it on a zombie that you couldn't just as easily first destroy, so it's moot anyway.
46,042
I know the Resurrection spell brings something back to life, but what happens when casting it on a zombie? A zombie is already dead, but now undead—does it "die" and is brought back to life, or does nothing happen?
2014/08/14
[ "https://rpg.stackexchange.com/questions/46042", "https://rpg.stackexchange.com", "https://rpg.stackexchange.com/users/15420/" ]
The Rules Are Contradictory =========================== The 7th-level Clr spell [*resurrection*](http://www.d20srd.org/srd/spells/resurrection.htm) [conj] (*PH* 272-3) and the 9th-level Clr spell [*true resurrection*](http://www.d20srd.org/srd/spells/trueResurrection.htm) [conj] (*PH* 296) say that > > You can [bring back from the dead] someone killed by a death effect or someone who has been turned into an undead creature **and then destroyed**. > > > (emphasis mine), but the spells inherit the entry *Target: Dead creature touched* from the 5th-level Clr spell [*raise dead*](http://www.d20srd.org/srd/spells/raiseDead.htm) [conj] (*PH* 268), which means that when the *Monster Manual* describes the type [undead](http://www.d20srd.org/srd/typesSubtypes.htm#undeadType), saying that > > *Resurrection* and *true resurrection* can affect undead creatures. These spells turn undead creatures back into the living creatures they were before becoming undead. (317) > > > it's saying an undead creature *can* be the target of spells that the spells say *can't* target an undead creature. The *Player's Handbook* is the final authority on spells, but the *Monster Manual* is the final authority on creatures. Thus it's best if the DM decides whether this is a spell issue or a creature issue and makes a house rule to resolve this contradiction accordingly. This rules quirk remains even in the updated 2013 printings of the *Player's Handbook* and *Monster Manual*.
They wouldn't come back. ------------------------ A zombie is a creature, it is not 'a corpse' which is the specified target for Resurrection. True Resurrection would arguably work, since it doesn't require a corpse. In that case, what happened to the Zombie would be up to the GM. It might conceivably continue to exist, as the True Resurrection spell creates a new body for the soul. That said, if you have the zombie, just kill it. Then it is a corpse again, and a target for Resurrection.
46,042
I know the Resurrection spell brings something back to life, but what happens when casting it on a zombie? A zombie is already dead, but now undead—does it "die" and is brought back to life, or does nothing happen?
2014/08/14
[ "https://rpg.stackexchange.com/questions/46042", "https://rpg.stackexchange.com", "https://rpg.stackexchange.com/users/15420/" ]
The Rules Are Contradictory =========================== The 7th-level Clr spell [*resurrection*](http://www.d20srd.org/srd/spells/resurrection.htm) [conj] (*PH* 272-3) and the 9th-level Clr spell [*true resurrection*](http://www.d20srd.org/srd/spells/trueResurrection.htm) [conj] (*PH* 296) say that > > You can [bring back from the dead] someone killed by a death effect or someone who has been turned into an undead creature **and then destroyed**. > > > (emphasis mine), but the spells inherit the entry *Target: Dead creature touched* from the 5th-level Clr spell [*raise dead*](http://www.d20srd.org/srd/spells/raiseDead.htm) [conj] (*PH* 268), which means that when the *Monster Manual* describes the type [undead](http://www.d20srd.org/srd/typesSubtypes.htm#undeadType), saying that > > *Resurrection* and *true resurrection* can affect undead creatures. These spells turn undead creatures back into the living creatures they were before becoming undead. (317) > > > it's saying an undead creature *can* be the target of spells that the spells say *can't* target an undead creature. The *Player's Handbook* is the final authority on spells, but the *Monster Manual* is the final authority on creatures. Thus it's best if the DM decides whether this is a spell issue or a creature issue and makes a house rule to resolve this contradiction accordingly. This rules quirk remains even in the updated 2013 printings of the *Player's Handbook* and *Monster Manual*.
If the zombie used to be a resurrectable creature in life, it is resurrected as that creature. The relevant quote from the description of the undead type is: > > Not affected by *raise dead* and *reincarnate* spells or abilities. *Resurrection* and *true resurrection* can affect undead creatures. These spells turn undead creatures back into the living creatures they were before becoming undead. > > > The resurrection spell does not directly contradict this. What it does say is: > > You can resurrect someone killed by a death effect or someone who has been turned into an undead creature and then destroyed. [...] Constructs, elementals, outsiders, and undead creatures can’t be resurrected. > > > The first part tells you the original creature can be resurrected if they were turned into an undead and destroyed, unlike with *raise dead*. The latter tells you you can't re-reanimate destroyed undead. You could interpret it as saying you can't cast *resurrection* on undead, but then it would also be saying you can't cast it on "living" constructs, elementals or outsiders. That clearly isn't the purpose (target is a dead creature touched); instead, it's saying those creatures, once destroyed/killed cannot be returned back to "life". So an undead cannot be resurrected as an undead, but can be resurrected as the original creature (where available) whether it is first destroyed (the spell description) or not (the type description). In practice, with 10 minute casting time, you are not going to be using it on a zombie that you couldn't just as easily first destroy, so it's moot anyway.
47,723,807
we have our application logs pumped to S3 via Kinesis Firehose. we want this data to also flow to DynamoDB so that we can efficiently query the data to be presented in web UI (Ember app). need for this is so that users are able to filter and sort the data and so on. basically to support querying abilities via web UI. i looked into AWS Data pipeline. this is reliable but more tuned to one time imports or scheduled imports. we want the flow of data from s3 to dynamoDB to be continuous. what other choices are out there to achieve this? moving data from S3 to dynamoDB isn't a very unique requirement. so how have you solved this problem? Is an S3 event triggered lambda an option? if yes, then how to make this lambda fault tolerant?
2017/12/08
[ "https://Stackoverflow.com/questions/47723807", "https://Stackoverflow.com", "https://Stackoverflow.com/users/3996525/" ]
**For Full Text Querying** You can design your solution as follows for better querying using AWS Elasticsearch as the destination for rich querying. * Setup Kinesis Firehouse Destination to Amazon Elastic Search. This will allow you to do full text querying from your Web UI. * You can choose to either back up failed records only or all records. If you choose all records, Kinesis Firehose backs up all incoming source data to your S3 bucket concurrently with data delivery to [Amazon Elasticsearch](http://docs.aws.amazon.com/firehose/latest/dev/create-destination.html). **For Basic Querying** If you plan to use DynamoDB to store the metadata of logs its better to configure S3 Trigger to Lambda which will retrieve the file and update the metadata to DynamoDB.
> > Is an S3 event triggered lambda an option? > > > This is definitely an option. You can create a [PutObject event](http://docs.aws.amazon.com/lambda/latest/dg/invoking-lambda-function.html#supported-event-source-s3) on your S3 bucket and have it call your Lambda function, which will invoke it **asynchronously**. > > if yes, then how to make this lambda fault tolerant? > > > By default, asynchronous invocations will [retry twice upon failure](http://docs.aws.amazon.com/lambda/latest/dg/retries-on-errors.html). To ensure fault-tolerance beyond the two retries, you can use [Dead Letter Queues](http://docs.aws.amazon.com/lambda/latest/dg/dlq.html) and send the failed events to an SQS queue or SNS topic to be handled at a later time.
7,883
I had a recent case where an unclear question was asked and answered many times before it was then amended to be more narrow. In this case, the edit invalidated a number of good answers to a common world building problem. Since my answer no longer had anything to do with the OP's revised question and the OP had no interest at that time of pursuing the removed question further, I created a new question just to re-ask the aspect of the question that the OP removed so that the answers to this question that no longer existed could be preserved, and the irrelevant answers to the original could be deleted or ammended. ORIGINAL: [What sci-fi discovery creates the most new technology with minimal explanation?](https://worldbuilding.stackexchange.com/questions/177183/what-sci-fi-discovery-creates-the-most-new-technology-with-minimal-explanation) FOLLOW-UP: [How to introduce fictional technology without creating plot holes](https://worldbuilding.stackexchange.com/questions/177247/how-to-introduce-fictional-technology-without-creating-plot-holes) **Do ye think that allowing users to create questions that reask removed aspects of older questions should be marked as duplicate?**
2020/05/27
[ "https://worldbuilding.meta.stackexchange.com/questions/7883", "https://worldbuilding.meta.stackexchange.com", "https://worldbuilding.meta.stackexchange.com/users/57832/" ]
The right answer to the wrong question is not helpful ----------------------------------------------------- In cases where the question is just too broad, I agree with Elemtilas that preserving the original question is the best approach, but in cases where the original question is actually asking two unrelated things, or is so unclear that multiple unrelated things can be drawn from it, I personally think the question should be broken into its parts. If left in its original state, you have a bad question that cannot be made into a good question without invalidating certain answers. If you leave it as a bad question, it will be closed quickly blocking both topics from discussion. If someone (OP or not) then tries posting 2 seperate questions that are both more clear questions on each topic, those too will be closed as duplicates further blocking discussion. I think this is a good strategy for maintaining the quality of WB.SE questions. I believe it encourages people to clean up thier answers as questions are revised which is important to keeping answers relevant to the question being asked. It also improves the searchability of questions on WB.SE so that as people look for questions that have already been asked, they are more likely to find the answers they are looking for. Allowing this should reduce actual duplicate questions and confusion.
**No.** I concur with your thesis that the right answer to the wrong question is unhelpful; but the better thesis here is don't change the question once it's gotten an answer! Having been in this situation before, I understand why you felt it was a good idea at the time. However, I believe this is the *wrong strategy* to address the particular problem. As I see it, the only situation you found yourself in was the nullification of your answer through query editing. In other words, the OP, or someone else, changes the fundamental nature of the query, which action now invalidates your answer. **The idea behind query editing is to improve the question, not change the question. Once a question has been answered, its fundamental nature can not be changed.** The only reasonable strategy that aligns with how SE works is to first address your concern in comments. You inform the OP that these certain edits need to be reverted or revised because they invalidate your response and here are the reasons why. If this doesn't provide a satisfactory response, then you should feel free to edit the question! A quick revert with a factual explanation as to rationale is sometimes the refreshing splash of cold water a new or recalcitrant OP needs! If the OP dereverts the query, thus reinvalidating your answer, please feel free to a) rerevert the question and b) flag for moderator intervention. If new information threatens to substantially alter a question, it really falls to the OP to simply ask a new question.
1,558,637
I have a VDSL home network that consists of a tp-link modem-router (Archer VR400), connected to a splitter (filter) by a 1 meter RJ11 cable. My current speed by Ethernet connection is 90-95/100 Mbps, so it seems my infrastructure is pretty reliable. My question is: will extending the length of the RJ11 to a 10m cable may greatly or noticeably decrease my internet connection? Also: are there any types and quality standards for RJ11 cables, such as Ethernet cat 5, cat 6 and etc ? I stumbled upon this very old question, but could not find a clear answer for my question: [How important for speed is the length of the phone cable between the wall and the modem?](https://superuser.com/questions/312276/how-important-for-speed-is-the-length-of-the-phone-cable-between-the-wall-and-th) Any suggestions?
2020/06/07
[ "https://superuser.com/questions/1558637", "https://superuser.com", "https://superuser.com/users/1185051/" ]
Telephone cable for RJ11 connections is simple round cable with some twist to the wires (but not in pairs). You can extend by 10 meters without any significant degradation. The signal from the ISP is meant to travel over that kind of cable. Use good quality (Belden or like) cable. Cheap cable may be inferior construction. No one can know precisely your situation (which is why you won't get a 100% black or white answer). So add your cable and relocate your gear.
It could matter if you are already right at the distance limit for DSL. There's only so far that a DSL signal can travel from the phone company "Central Office" (or any signal amplifier they may have) and if you are outside the range it will start dropping a lot of packets due to signaling errors. That said, it's not such a big deal to just try it. Your DSL modem should have a web page where it shows error statistics, so you can compare it before the change and after the change. If it turns out that it's too far, just go back to the shorter cable and figure out a different place to put the modem. Other than that, you should not have any problems.